Skip to main content

NEWS & EVENTS

What is User Activity Monitoring? How It Works, Benefits, Best Practices, and More


Adobe Fixes 47 Vulnerabilities in Acrobat, Reader, Photoshop


16 Hot New Security Products Launched At Black Hat 2016

Some hot, new security products were launched at Black Hat 2016, including a planned integration between DG and CounterTack.

Read Now

12 Days In, Ransomware Attack on Healthcare System Continues


7 Reasons to Move to Saas Data Protection - Guide - Thank You


Sally Beauty: When one Breach Begets Another


Financial Markets


20 Information Security Tips for Hospitals


IoT product development is broken – 6 ways developers and manufacturers can fix it

The burden of securing IoT devices & finding fixes when a vulnerability is exploited falls squarely on product manufacturers and developers. Written by Digital Guardian's Thomas Fischer.

Read Now

White House Presses Agencies to Protect Critical Software