How to Find and Retain Skilled Cybersecurity Talent



To kickoff this year’s National Cybersecurity Awareness Month we asked our VP of Cybersecurity what organizations can do to find and retain skilled cybersecurity talent.

Battery Manufacturer Alleges Scientist Took Trade Secrets to China



In a new lawsuit, a U.S. based battery company is alleging one of its former employees brazenly took its trade secrets and infringed its patents.

Friday Five: 9/27 Edition



Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!

EU Court Limits 'Right to Be Forgotten'



Google won what many viewed as a milestone case this week as Europe's top court ruled it doesn't have to extend the "right to be forgotten" privacy rule beyond the EU’s 28 member states.

Digital Guardian Designated a Cyber Catalyst By Marsh



Digital Guardian is excited to share that our Data Protection Platform has been designated a Cyber CatalystSM solution!

OCR Outlines Best Practices for Managing Malicious Insider Threats



The HHS Office for Civil Rights (OCR) is reiterating that when it comes to safeguarding critical data, healthcare organizations need to know the where, who, what, and how.

46 Million Person Airline Breach Caused by Ex-Contractors



It appears this summer's 46-million-person breach at a Southeast Asian airline carrier wasn’t caused by a misconfigured bucket but by two ex-staffers at a contracting firm.

Friday Five: 9/20 Edition



A popular password manager fixes a bug, a 20 million person breach, and more - catch up on the week's infosec and privacy news with this week's Friday Five!

What is Electronic Healthcare Network Accreditation Commission (EHNAC) Compliance?



Learn about what the Electronic Healthcare Network Accreditation Commission, or EHNAC, is, its benefits, the accreditation process, and best practices in Data Protection 101, our series on the fundamentals of data security.

MITRE Releases 2019 List of Top Security Weaknesses



MITRE has published a list of the most dangerous software errors - weaknesses that could lead to a critical vulnerability and in turn, code execution and the theft of data, if left unresolved.

Pages