Juliana de Groot
Juliana is a former Senior Marketing Operations Specialist at Digital Guardian. Prior to joining Digital Guardian, she worked at Dell and CarGurus.
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
Digital Guardian's Blog
Juliana is a former Senior Marketing Operations Specialist at Digital Guardian. Prior to joining Digital Guardian, she worked at Dell and CarGurus.
RSA is next week! Find Digital Guardian at our virtual booth in the Digital Expo or attend one of our sessions!
Threat intelligence is all about collecting data, information that can keep you apprised of potential threats. What are the most critical components of threat intelligence? We asked 24 experts.
Threat analysis tools with updated intelligence feeds have become an essential part of defenders' toolkits. In this blog, we look at 50 threat intelligence tools that can help teams better protect their business.
The National Institute of Standards and Technology's Cybersecurity Framework is designed to help organizations manage their security risk; in this blog we'll go over its requirements, penalties for failing to comply with it, and best practices.
In our latest group interview, we asked 21 experts and business leaders what they think the most important thing for companies to keep in mind about managed detection and response costs is.
Learn about data security and the role it plays in many data protection solutions in Data Protection 101, our series on the fundamentals of data security.
Learn about how security operations centers work and why many organizations rely on SOCs as a valuable resource for security incident detection.
Many companies are requiring employees to work from home and use collaboration software to communicate. What are the best ways to mitigate risks in collaboration software? We asked 27 experts their best practices.
SOC 2 is a set of compliance requirements for companies that use cloud-based storage of customer data. Learn about the basics of SOC 2 and best practices in this week's Data Protection 101!
Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.