Blog

Blog

What Is Content Inspection?

Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Blog

Terabytes of Data Stolen? The Lessons of Operation Iron Tiger

A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?
Blog

Compromising Emanations

Manipulating sound waves to open a vector for data exfiltration seems like the stuff of science fiction - but based on recent research, the technique is quite plausible.
Blog

What Is Personally Identifiable Information?

Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks. Read on to learn how to better protect PII from unintentional exposure.
Blog

5 Steps to Prevent Sensitive Data Loss

Ashley Madison is just the latest company to lose gigabytes of customer data in a high profile breach. How can companies protect their information in the face of cyberattacks?
Blog

What is NIST Compliance? (Checklist, Definition, & More)

The NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high tech industries today.
Blog

Six Questions about Application Whitelisting & Advanced Threats

Learn more about app whitelisting in a short question and answer session with Chris Sherman of Forrester and John Fox of Digital Guardian. This Q&A was taken from our webinar, “Why Application Whitelisting is Essential for Advanced Threat Defense.”
Blog

DDoS As a Cover for Data Theft

Distributed denial of service attacks are IT teams' worst nightmare - but they may be the least of your problems, experts say.
Blog

18 Questions about Splunk and Digital Guardian

Here are 18 great questions about our integration with Splunk (and other SIEMs), answered by Tony Themelis, VP of Product Strategy here at Digital Guardian. This Q&A was taken from our webinar, “How Splunk + Digital Guardian Protect Data from Advanced Threats.”