Skip to main content

Data Protection



The Evolution of an Insider Threat: How a Business Analyst Turned into a Rogue Hacker

The Advanced Threat & Analysis Center (ATAC) team here at Digital Guardian are on high alert for any suspicious activity that is generated from our customer environments through our Managed Service offering. Most times we’ll detect external cyber-attacks and/or intrusions, however recently we came across a rather interesting finding that was almost too good not too share with our readers.





5 Steps to Deterring Insider Data Theft

The insider threat is something that every company must deal with, but effectively mitigating the risk of insider data theft can be difficult. Follow these 5 steps to drastically reduce the chances of insider theft at your company.


Is it Worth Combating Insider Threats?

Insider threats are particularly pernicious because the attacker has legitimate access to the data and valid credentials. This makes insider threats extremely difficult to defend against.


Get the latest security insights
delivered to your inbox each week.