Clawback: Reports Suggest Companies Paying To Reclaim Stolen Data
A recent news report and a survey suggest that companies may be paying to get back data stolen more often than you’d think.
The End of the Line for Internet Explorer V8, 9, 10: What to Do
Today marks the end of support for Microsoft Internet Explorer versions 8, 9, and 10. What does this mean for browser security?
Healthcare Security: Understanding HIPAA Compliance and its Role in Patient Data Protection
After the "year of the healthcare breach," many healthcare organizations are taking steps to improve their data protection strategies to meet regulatory requirements and secure health information against costly data breaches. Here's an overview of the data protection requirements for compliance and beyond.
Missing in Michaels Data Breach: Harm To Consumers
A federal judge throws out a lawsuit against the craft store Michaels after plaintiffs fail to prove that any damages occurred as a result of the leak.
Behind the Curtain: The Path to Becoming a Leader in a Gartner Magic Quadrant
In anticipation of the soon-to-be-released Gartner Magic Quadrant for Enterprise Data Loss Prevention, here's a behind the scenes look at the submission process.
Optimizing Your Data Protection: Part Two
Watch the second installment in our two-part series with Tony Themelis on optimizing organizational data protection programs.
Optimizing Your Data Protection: Part One
This two-part series features Q&A sessions with Tony Themelis, VP of Product Strategy at Digital Guardian, on how organizations can optimize their data protection programs. Here’s the first installment.
New Tech for the Holidays? Here's How to Securely Wipe Old Devices Before Donating
Donating old technology is a great practice - rather than disposing of devices simply because you don't need them, donating lets those devices go to those who will still benefit from their use. However, it's important to securely wipe devices before donating to ensure that your personal data stays private.
Simplifying export control compliance while reducing cost
Export controls like ITAR and EAR put compliance challenges on many security teams. Our latest whitepaper provides strategies for meeting export compliance and reducing cost with data protection solutions.
Healthcare Leaks Not Just For Healthcare Providers
A report from Verizon finds that leaks of protected health information are epidemic, as more, different types of organizations are called on to track and store health data.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.