Resources

Datasheet

Clearswift Email Encryption

Fortra's Clearswift Secure Email Gateway appliance provides a number of options to secure email sent over the Internet through the use of encryption.Securing messages by encryption ensures that messages have:Confidentiality – generally messages can’t be read by the wrong personIntegrity – the message is intact and can be shown to have not been modified by anyone from sender to recipientNon...
Datasheet

Clearswift and Echoworx: Encryption Portal

There are a variety of Email Encryption options available on the market today, but a number of these solutions can be too complicated for people to use and adoption of encryption technology is often hindered for this reason. Clearswift, in conjunction with Echoworx, provides an intelligent, automated encryption solution to ensure that email messages are delivered securely, and critical information...
Blog

Why Supply Chains Are Today’s Fastest Growing Cybersecurity Threat

Business ecosystems have expanded over the years owing to the many benefits of diverse, interconnected supply chains, prompting organizations to pursue close, collaborative relationships with their suppliers. However, this has led to increased cyber threats when organizations expose their networks to their supply chain and it only takes one supplier to have cybersecurity vulnerabilities to bring a...
Blog

Internal Breaches: The Threat That’s Too Close to Home

There were 108.9 million accounts were breached in the third quarter of 2022. This is a 70% increase compared to the second quarter. However, despite a common belief that attacks mostly involve cyber espionage or are state-sponsored, our research found that 42% of security incidents actually come from inside the organization. Since the introduction of data protection laws, such as GDPR, it is...
Blog

Catching Lookalike Domains with Image-Based Analysis

Reading is like riding a bicycle: once you master it, it feels easy and automatic, and you quickly forget how much effort it took to learn. For example, we are normally not aware that we move our eyes 3 or 4 times per second as we read, glancing at each word on a screen or page for a few hundred milliseconds. Nor do we realize that only a portion of a word is visible and in focus at any given...
Blog

TLS Email Encryption: What It Is & How to Check if Your Email Is Using It

What exactly is TLS when it comes to email encryption? TLS, or cybersecurity protocol Transport Layer Security first developed by the Internet Engineering Task Force (IETF), was designed to establish secure communications that provide both privacy and data security. Originally created from another encryption protocol called Secure Sockets Layer, or SSL...
Blog

Inside a Compromised Account: How Cybercriminals Use Credential Phishing to Further BEC Scams

Why would a cybercriminal spend time developing malware when he can simply trick unsuspecting users into handing over their passwords? Why would a threat actor spend her money and resources on ransomware, when she can get that same information through a compromised account? It’s a good question, and exactly what the Fortra Cyber Intelligence Team, Fortra's group of threat hunters, wanted to...
Blog

BIMI is Officially Trending as Adoption Jumps 72% in Just 6 Months

After a dramatic surge in adoption during the second half of 2020, BIMI may soon become an email marketing must-have.As of December 31, 2020, nearly 9,100 companies have adopted Brand Indicators for Message Identification (BIMI), an email standard for showcasing a brand's logo next to its email messages in recipient inboxes, with built-in protections against phishing-based brand spoofing.That's a...
Blog

How to Implement the BIMI-Selector Header for Multiple Brands

Wondering what Brand Indicators for Message Identification actually means? Here, we’ll cover the basics of BIMI, what the BIMI-selector header is, what it does, whether you need it, and how to implement it. But first, do you really need the BIMI-selector header? In most cases, you only need the BIMI-selector header if you want to support multiple logos for multiple brands or subdomains. Otherwise,...
Blog

Cyber Threat Intelligence: How to Stay Ahead of Threats

Generally defined, cyber threat intelligence is information used to better understand possible digital threats that might target your organization. This data will help identify threats in order to prevent security breaches in the future.Why Cyber Threat Intelligence is ImportantHaving a system in place that can produce threat intelligence is critical to staying ahead of digital threats, as well as...
Blog

5.8B Malicious Emails Spoofed Domains; 76% of Fortune 500 Still at Risk: DMARC Results from Agari

Global adoption of Domain-based Messaging, Reporting & Conformance (DMARC) topped 10.7 million email domains worldwide in 2020—reflecting a 32% increase in just six months, according to our H1 2021 Email Fraud & Identity Trends Report. The total number of domains with DMARC set to its highest level of protection against email spoofing climbed to 3.8 million during the same period. That's up a...
Video

How to Protect Confidential Information in Transit

In this webinar, we’ll examine these use cases and look at the various ways organizations can transfer confidential information securely and compliantly.
Blog

Powerful New Cloud Email Protection Integration Comes to Cortex XSOAR

As we expand our integrations with industry leaders, we’re very excited to highlight a new Agari integration with Palo Alto Networks Cortex XSOAR that helps security teams improve email threat visibility and accelerate their ability to respond to phishing attacks. This new integration is welcome news for security teams who are feeling pummeled by a never-ending onslaught of phishing attacks....
Video

Get the Most from Your Secure Email Gateway

In this webinar, Alyn Hockey, VP Product Management, shows you how to get the most from your Clearswift investment by demonstrating the capabilities of the Secure Gateway.
Blog

New Research Shows 61% of Employee-Reported Phishing Emails are False Positives

A year into the pandemic, Security Operations Centers (SOCs) are getting bombarded by employee-reported phishing attacks both real and imagined—as legitimate threats slip by unnoticed, according to analysis from our latest cross-industry phishing response survey. Long before any of us had ever heard the term "COVID-19," phishing was implicated in nearly 7 in 10 corporate data breaches, prompting...