What is the General Data Protection Regulation (GDPR)? Everything You Need to Know
Learn about the General Data Protection Regulation (GDPR) and the requirements for compliance in Data Protection 101, our series on the fundamentals of information security.
Don't Fall Victim to These Cyber Monday Scams
Phony sites, fake apps, and spammy text messages are just some of the ways attackers can trick users into surrendering credit card and social media credentials.
What is a Next Generation Firewall? Learn about the differences between NGFW and traditional firewalls
Firewalls are a standard security tool for the majority of companies, but in today’s changing threat landscape, next generation firewalls are the only firewalls that can provide proper protection.
Experts on the Top InfoSec Considerations for Manufacturers
16 infosec pros and security experts discuss the top information security considerations for manufacturers today.
Mobile Banking Trojan BankBot Identified, Removed From Google Play
A banking Trojan, BankBot, snuck past Google Play's protections last month to target Wells Fargo, Chase, and Citibank customers on Android devices worldwide.
What is Unified Threat Management (UTM)? Defining and Outlining the Benefits of Unified Threat Management
Learn about unified threat management solutions and their benefits in Data Protection 101, our series on the fundamentals of information security.
Inside Digital Guardian's Advanced Threat Protection: Part Three
In today's blog, the last in a three part series, we break down what differentiates Digital Guardian's Advanced Threat Protection capabilities from other endpoint detection response products. Read the first part in this series here and the second part here.
What is Malware Analysis? Defining and Outlining the Process of Malware Analysis
Learn about malware analysis as well as how to use malware analysis to detect malicious files in Data Protection 101, our series on the fundamentals of information security.
Inside Digital Guardian's Advanced Threat Protection: Part Two
In today's blog, the second of a three part series, we break down how Digital Guardian's Advanced Threat Protection Historical Detection feature can help help provide endpoint detection visibility. Look for the last part of the series on Wednesday, November 15.
Inside Digital Guardian's Advanced Threat Protection: Part One
In today's blog, the first of a three part series, we break down how Digital Guardian's Advanced Threat Protection Real-Time Detection feature can help help provide endpoint detection visibility. Look for part two of the series on Monday, November 13.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.