Skip to main content

NEWS & EVENTS

5 Myths Holding Your Security Program Back

Dan Geer for Security Magazine on the common roadblocks to security success.

Read the full article

Learn More

Study: 'High priority' issues hamper endpoint security solution implementation

Although more than a quarter of IT security professionals believe endpoint forensics solutions could improve time and effectiveness related to incident response, not all enterprises have chosen to integrate thorough endpoint security.

Read the full article

Learn More

Video

Your Data Will Travel - Shouldn't Your Security?


phishing thumbnail

Don’t Get Hooked: How to Recognize and Avoid Phishing Attacks (Infographic)


How Microsoft and Digital Guardian Help Protect Your Sensitive Data


Fortra Friday Five thumbnail image

Friday Five: A Google Ads Malware Campaign, New Cyber Resources for At-Risk Groups, & More


Export Control Compliance, Improved Productivity and $4 Million Annual Cost Savings

Read Now

Anthem Reminds Us That We Need a New Tune for Data Security

Digital Guardian CEO Ken Levine explains how the Anthem and Sony breaches exemplify the need for better data security measures.  

Read the full article. 

Learn More

person holding tablet device

Definitive Guide to Protecting Sensitive Healthcare Data


Indicators of compromise

What are Indicators of Compromise?