Introducing Data Insider, the new Digital Guardian Blog
Today we unveil an all new, redesigned Digital Guardian blog, DATAINSIDER.
Today we unveil an all new, redesigned Digital Guardian blog, DATAINSIDER.
The scourge of data breaches and identity theft is more than a decade old. But our tools for dealing with these common incidents are outdated and ineffective. Why?
The scourge of data breaches and identity theft is more than a decade old. But our tools for dealing with these common incidents are outdated and ineffective. Why?
Part 7 of our Field Guide to Incident Response series offers tips for using your existing security tools to facilitate incident response efforts.
Learn about advanced malware in Data Protection 101, our series on the fundamentals of information security.
By now, you will be aware that the Internet of Things is a thing and that it is an ever-growing network made up of disastrously insecure appliances, vehicles, cameras, and other devices connected to the Internet. What you may not be aware of is that this shadow network is now being used as a weapon to attack web sites with DDoS floods with some of the highest volumes ever seen.
By now, you will be aware that the Internet of Things is a thing and that it is an ever-growing network made up of disastrously insecure appliances, vehicles, cameras, and other devices connected to the Internet. What you may not be aware of is that this shadow network is now being used as a weapon to attack web sites with DDoS floods with some of the highest volumes ever seen.
Part 6 of our Field Guide to Incident Response series offers 3 tips to optimize coordination across the IR team and limit the opportunity for follow-on incidents.
The latest in our Data Protection 101 series offers tips and suggested solutions for ransomware protection.
The Colorado branch of Habitat for Humanity says a long-running and “malicious” data breach started with ransomware in June, and is making it hard to even conduct business.