The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
Global security advocate Thomas Fischer shows off the Digital Guardian endpoint agent’s capabilities when it comes to detecting and stopping USB-based malware in this blog post. While malware has spread via USB for some time now, this vector for attacks and propagation remains a challenge for many security teams today. Check out the post for a look at an actual USB propagating malware attack from the Digital Guardian Management Console’s point of view.
Director of cybersecurity Tim Bandos’ post on threat hunting on a budget was popular due to its tips for getting started with threat hunting and analyzing logs for threat indicators. Tim’s article even offers configuration guides for popular open source tools Logstash and NxLog to help even the most bootstrapped security teams sift through mountains of data and find threats. Check out the post and kick start your threat hunting initiative today!
Ransomware attacks plagued businesses last year, so our interview with a panel of security experts offering advice for ransomware protection and removal was a hit. With tips from 44 security experts on how to protect yourself and your company from ransomware, this article is chock full of must-know information for any internet user today.
There was no shortage of data breach incidents in 2015, and our article covering the ten biggest breaches of the year ended up becoming a popular resource for readers seeking a snapshot of the year’s most high-profile security incidents. Check out the list for a look back at those breaches and keep an eye out for our forthcoming recap of the biggest data breaches of 2016.
The most popular article from our expert panel interview series focused on the age-old security question: what poses the greater threat to your sensitive data, insiders or outsiders? With 47 data security experts coming from diverse backgrounds ranging from security researchers and analysts to executives and even technology and IP lawyers, the article offers a broad range of perspectives to consider in your own threat analysis.
2016 saw the release of Gartner’s first Magic Quadrant report covering data loss prevention in three years and for the fourth consecutive time we were named a “Leader” in the DLP market. Check out the post for a snapshot of the 2016 MQ for DLP and download the report to get Gartner’s latest analysis of leading data loss prevention solutions.
This infographic presented the results of our analysis of CISOs and equivalent security leaders at Fortune 100 companies in a series of data visualizations. Covering everything from education and certifications to previous work experience and tenure in their current positions, the infographic found some interesting trends amongst today’s top security leaders. Check out the graphic for more.
Despite being published in late September of last year, our infographic promoting phishing attack awareness shot to #3 on the list. With examples of many of the common phishing tactics and tips for protecting yourself against them, this infographic was popular with IT/security professionals and end users alike for its comprehensive coverage of one of the most common cybersecurity threats. Check out the infographic and watch out for phishers!
Our inaugural roundup of the top colleges and universities for cybersecurity education was a big hit with readers looking to start (or further) their careers in information security. With profiles of over 80 institutions around the world, this article covers the degrees, programs, and scholarship opportunities offered by each, as well as important considerations for applicants like cost and post-graduation hiring rates. Keep an eye out for the 2017 edition of this article with additional schools and updated program information.
For the second year in a row, our roundup of the top information security conferences happening around the world was our most popular article of the year. After becoming a favorite resource for infosec professionals looking to plan their conference schedules in 2015, we decided to update the article annually, and our 2016 update held strong to the #1 spot. Stay tuned for our 2017 update with the top security events for the year to come!
So there you have it, our top ten posts from last year. This article wouldn’t be complete without a huge thank you to the 465,000+ of you who took time to visit our blog, read some articles, and maybe even share on social media or subscribe. Here’s looking forward to another great year!