NEWS & EVENTS
Insiders Continue to be Data Theft’s Best Friend
Digital Guardian VP of Cybersecurity Tim Bandos discusses the continued prevalence of insider threat and the importance of educating employees on security best practices.
2018 Cloud Partner Program Guide
Digital Guardian offers easier enablement and delivery of service through a cloud-hosted SaaS solution.
Digital Guardian Issues State-by-State Data Breach Law Guide And Remote Worker Cybersecurity Tips
Digital Guardian has created an in-depth state-by-state guide to U.S. data breach laws to make it easier for it easier for businesses and cities to navigate data breach laws across the country.
Data Breach Notification Laws: Is it Time for a Uniform Standard?
Security firm Digital Guardian created a detailed data-breach disclosure law infographic to document the hodgepodge of state laws that all organizations must comply with.
5 reasons federal agencies are so challenged by identity and access management
A 2017 survey by Digital Guardian indicates that password overload is a major reason why many people use the same password for multiple accounts.
New Guide on State Data Breach Laws
A guide summarizing data breach laws in every state and territory was recently released by Digital Guardian.
How Well Does Your State Protect You From the Aftermath of Data Breaches? (Infographic)
Digital Guardian's Data Breach Heatmap infographic illustrates the differences in state data breach laws across the United States.
Best security software: How 18 cutting-edge tools tackle today's threats
CSO writer John Breeden cites Digital Guardian as being on of the the best endpoint security solutions available in 2018.
5 Important Healthcare Cloud Security Factors to Weigh
Training employees on proper security practices tops Digital Guardian's list of tips for safeguarding healthcare data.
MY TAKE: The back story on the convergence, continuing evolution of endpoint security
Security writer Byron V. Acohido sites Digital Guardian's report on security spending in his article on how endpoint security is evolving.