Flash drive-by downloads and malvertising continue to be common attack vectors for malware infections. Here's a look at how these attacks can be detected and stopped based on behavioral characteristics.
A wave of ransomware attacks targeting businesses has been making headlines lately – here’s what a typical Locky ransomware infection looks like and how these attacks can be detected.
Thomas Fischer and Paul Roberts discuss the ransomware problem that is currently impacting businesses around the globe.
How many Macs do you have in your company and your data protection program? Watch this video demo to learn about Digital Guardian Data Loss Prevention for Mac environments.
Intellectual property takes serious work to create and requires a smart solution for protection. Watch this video demo to learn how Digital Guardian secures IP in a variety of forms.
Watch this video demo to see how Digital Guardian protects data from insider threats.
Put those hot glue guns away – here’s how to detect and mitigate USB propagating malware.
Dridex keeps coming back with a vengeance - let's take a look at how the malware works and what can be done to stop it.
Today we’re sharing a use case from the DG Lab in which we detected a variant of the CryptoWall 3.0 ransomware by correlating indicators of compromise within system process calls in real time.
Looking to build a threat intelligence program at your company? Knowing and understanding your network is a critical first step. Let's get started!
Get email updates with the latestfrom the Digital Guardian Blog
Thank you for subscribing!