CLOSEX

Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
Email Threat Prevention
4 Dec 2014

Five Steps to Keep Your Email Attachments Secure

Although they are essential in most businesses, email attachments can be used to spread malware infections, gain access to systems, and leak confidential...
We have previously explored how Metascan can be used to eliminate threats embedded in image files. Another potential threat vector involving embedded malware...
Kaspersky Lab and Interpol's recently released Mobile Cyber Threat Report shows a significant increase in the number of cyber-attacks targeting Android users,...
OPSWAT today announced the release of their latest market share report, which includes detailed analysis of the antivirus market share worldwide. In addition...
OPSWAT and InQuest have partnered to offer our government and defense customers an in-depth malware detection and analysis tool. This exciting new...
Kiosk & USB Security
26 Aug 2014

Detecting and Mitigating USB-based Threats

The flexibility of the USB protocol and the inherent trust given by Windows, Mac, and Linux operating systems to Human Interface Devices (HIDs), such as...
OACCP Certification
30 May 2014

OPSWAT Certifications for May

Here are our latest OPSWAT Certifications for the month of May. Please give a warm welcome to our new partners Elex Technologies and Tech...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.