Blog

Blog

The Cost of a Data Breach? $88 Million

There’s a lot of debate about how much data breaches and hacks cost companies – except when there’s not, as with the hack of UK firm TalkTalk, which put the cost at around $88 million.
Blog

Drug Development and Intellectual Property Theft

Competitive forces in the pharmaceutical industry have led to increased intellectual property theft. As this trend continues, pharmaceutical companies and manufacturers of all industries must focus on protecting the sensitive data that their competitive advantage is built on.
Blog

WIPOut: The Devastating Business Effects of Intellectual Property Theft

A recent 60 Minutes feature told of China’s current cyber-espionage campaign that stole one company’s intellectual property in its near entirety. As China’s campaign continues targeting U.S. companies across every industry, those companies must take steps to protect IP and preserve their competitive advantage.
Blog

What is FTP Security? Securing FTP Usage

File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
Blog

Optimizing Your Data Protection: Part One

This two-part series features Q&A sessions with Tony Themelis, VP of Product Strategy at Digital Guardian, on how organizations can optimize their data protection programs. Here’s the first installment.
Blog

Digital Guardian Secures $66 Million in New Funding

We’ve raised $66 million in new funding, marking the largest single round of investment in company history and providing the resources needed to make our vision of ubiquitous data protection a reality. Read on for more.
Blog

What is File Sharing Security?

Cloud storage and file sharing apps bring a many benefits to enterprises due to their scalability and convenience. However, when not managed properly, file sharing can have serious implications from a data security standpoint. Read on to learn about the risks of unmanaged file sharing and how companies can securely adopt file sharing systems.
Blog

Gadgets That Eavesdrop

This holiday season you might be receiving a voice-controlled gadget – a voice controlled TV, a phone, or even an Amazon Echo. The convenience of this is obvious. But what about the downside? In order for the device to respond to your command – even its wake up command – it must, by definition, be listening. And it could be listening – and recording – a business-related conversation.