Skip to main content

NEWS & EVENTS

What is Threat Monitoring?


New Ransoc extortionists hunt for actual child abuse material

Hackers have unleashed a strain of scammer that activates on compromised computers when it encounters filenames containing strings that have been associated with child abuse clips and images.

Read Now

What is Insider Data Theft? Data Theft Definition, Statistics and Prevention Tips


DLP Program Phase 5: User Education - Guide - CTA


origami

Forrester Names Digital Guardian a Leader in Endpoint Detection and Response


DG exterior

An Interview with Ben McGraw, Cybersecurity Manager at Digital Guardian Part I


Answering the Critical Post Incident Questions


SEE WHAT FINANCIAL DATA TO PROTECT


HSBC's voice recognition security system gets pwned by the BBC

HSBC'S VOICE RECOGNITION security system can be spoofed by someone who sounds a lot like the actual customer, the BBC has found.

Read Now

What is Cyber Security? Definition, Best Practices & Examples