Nate Lord
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
Digital Guardian's Blog
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
What does the typical Fortune 100 CISO look like? We researched the top security leaders at F100 companies to get a better idea – here’s what we found.
Data breaches via third parties are a growing problem impacting companies across many industries – and one that can be even more difficult to defend against. How can companies secure their assets against cyber attacks that target suppliers and partners or use information stolen in previous breaches?
The RSA Conference kicks off next Monday and we have a lot going on: a speaking session, in-booth demos, great contests, giveaways, and more. We hope to see you there!
As cloud adoption continues to grow rapidly at the enterprise level, IT and security departments must provide for secure use of cloud storage and services.
The RSA conference starts in less than a month and we're coming with a brand new t-shirt design to give away. The best part? You get to choose our design - vote now!
Friday is here! Catch up on this week’s top security news.
Test your level of preparedness for a security audit with this interactive assessment.
File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
Here’s a look back at the top ten biggest data breaches in 2015.
After the "year of the healthcare breach," many healthcare organizations are taking steps to improve their data protection strategies to meet regulatory requirements and secure health information against costly data breaches. Here's an overview of the data protection requirements for compliance and beyond.