Read how a customer deployed a data protection program to 40,000 users in less than 120 days.
Threat intelligence is all about collecting data, information that can keep you apprised of potential threats. What are the most critical components of threat intelligence? We asked 24 experts.
The new guidance highlights software supply chain risks and tips on how to identify, assess, and mitigate risks.
The $3M penalty is the largest published assessment to date for alleged violations of the Cybersecurity Regulation.
Ransomware glitches, rules governing AI, and the state of privacy legislation - catch up on all of the week's infosec news with the Friday Five!
Find Digital Guardian at our virtual booth in the Digital Expo or attend one of our sessions!
Asset management, endpoint protection, implementing monitoring capabilities, encryption, and data loss prevention tools can all help reduce the risk of cyberattacks on telehealth systems.
If it gains traction and passes, the bill would supersede most state privacy laws already on the books.
Ransomware gang profiles, cybersecurity nominations, and efforts to stop foreign hackers - catch up on all of the week's infosec news with the Friday Five!
The request comes as part of a multi-pronged effort, including sanctions, financial penalties, and expulsions, coordinated by the U.S. against Russia.
The bugs, discovered by the NSA, "could allow persistent access and control of enterprise networks."