The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
The Dridex malware made a comeback in 2015, stealing over $40M from victims in the U.K. and U.S. after being spread through large scale phishing campaigns. On the heels of the Dridex campaign, Digital Guardian researcher Thomas Fischer wrote this article to give examples of common phishing techniques and show how Dridex can be detected and stopped.
October 2015 marked the 12th annual National Cyber Security Awareness Month, and we released this infographic to celebrate the month and drive awareness of the risks of divulging too much personal or company information on social media. Check out the infographic for tips for using social media safely and securely.
Ransomware attacks continued to be a problem through 2015, so Digital Guardian researchers Andy Passidomo and Dimitris Tsapakidis wrote this article with screenshots from the DG lab to demonstrate how CryptoWall 3.0 can be detected based off of behavioral correlation.
Keeping track of data breach news in a year that saw breach after breach proved challenging; this article offers an overview of some of the biggest data breaches of all time and provides a historical overview of the growing data breach issue.
This guest post from security researcher Lance James is a must-read for security professionals tasked with building or managing threat intelligence programs at their companies. From basic domain name categorization to in-depth analysis of malicious domains, Lance’s post offers a great introduction to network threat intelligence.
Readers loved this interactive infographic for its visual breakdowns of hacking attacks against users around the U.S. Check out the article for the most hacked states and a history of malware attacks.
This article features a panel of security experts weighing in on how businesses fall victim to phishing attacks and what can be done to protect against them. The experts’ responses provide examples of a wide range of different phishing techniques and provide tips to help end users better recognize and avoid phishing attacks.
This massive post offers a selection of 101 important quotes spanning many facets of data security. Check out the list for helpful tips on computer and mobile device security, protection against malware and social engineering attacks, and secure habits for various online activities.
2. Data Security Experts Reveal the Biggest Mistakes Companies Make with Data & Information Security
The most popular post from our expert panel series features 30 information security experts discussing the biggest and most common mistakes companies make in their data security efforts. From neglecting employee security training to taking a “silver bullet” approach, this article covers a host of security pitfalls to avoid in your own data security program.
Last January we published our roundup of the top 50 information security conferences happening around the world in 2015. The post ended up being a favorite resource for infosec professionals looking to plan their conference schedules for the year. Stay tuned for our 2016 update with the top events for the year to come!