Nate Lord
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
Digital Guardian's Blog
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
Learn about the need for email security as well as tips for securing email usage in Data Protection 101, our series on the fundamentals of information security.
Learn more about how data loss prevention solutions are evolving to protect sensitive data in the cloud.
Learn more about encryption’s role in cloud data protection.
File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
After the "year of the healthcare breach," many healthcare organizations are taking steps to improve their data protection strategies to meet regulatory requirements and secure health information against costly data breaches. Here's an overview of the data protection requirements for compliance and beyond.
Cloud storage and file sharing apps bring a many benefits to enterprises due to their scalability and convenience. However, when not managed properly, file sharing can have serious implications from a data security standpoint. Read on to learn about the risks of unmanaged file sharing and how companies can securely adopt file sharing systems.
Learn about data discovery and the role it plays in many data protection solutions in Data Protection 101, our series on the fundamentals of data security.
File fingerprinting, also known as data fingerprinting or document fingerprinting, is a technique employed by many network data loss prevention solutions for identifying and tracking data across a network. Read on to learn more about fingerprinting and the security benefits of a DLP solution with data fingerprinting capabilities.
Learn about common uses for network data loss prevention solutions, from insider threat protection to compliance.
Learn how public key cryptography works as well as common uses for this cryptographic method.