Nate Lord
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
Digital Guardian's Blog
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks. Read on to learn how to better protect PII from unintentional exposure.
Six steps for effective incident response.
The NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high tech industries today.
As social engineering attacks continue to grow in sophistication and frequency, companies should look to employee education as a first line of defense. Learn how to recognize and avoid social engineering attacks in this installment of our Data Protection 101 series.
Zero-day vulnerabilities and exploits present a serious risk to company data. Learn more about zero-days and how to defend against them in our Data Protection 101 series.
Learn how to recognize and defend against malware attacks in Data Protection 101, our series on the fundamentals of information security.
Learn more about the risks of cloud account hijacking and methods to prevent sensitive data loss in the cloud.
Don’t sacrifice security for the convenience of cloud computing – learn how to apply encryption methods to ensure that data stays safe in the cloud.
Learn about advanced persistent threats, including how they work and how to recognize signs of an APT attack.