Resources

Blog

IP Theft: Definition and Examples

IP theft can have long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.
On-Demand Webinar

How to Apply EDR Techniques for More Effective DLP

Endpoint Detection & Response (EDR) has traditionally been used to combat externally based threats, but what if you could apply the techniques to your Data Loss Prevention (DLP) solution and combat all threats?Justin Bortnick, VP of Sales Engineering, will show you how understanding EDR methodologies and including them in your DLP program will help you be more effective at protecting sensitive...
On-Demand Webinar

Using SOAR Tools to Accelerate and Automate Data Security

One of the biggest challenges for infosec analysts and leaders is being able to respond to the most serious threats before data loss or theft. Security orchestration, automation, and response (SOAR) solutions lets infosec teams integrate and automate responses.Join Chris Saucier, DG SE, for a demonstration of how SOAR tools can retrieve incidents and automate response actions. With reaction faster...
On-Demand Webinar

The Incident Responder's Field Guide: Lessons from a Fortune 100 Incident Responder

Incident detection is only part of the story, what happens once your team identifies a credible threat that has made its way into your organization? What are the first steps to take to respond, who should (and who shouldn’t) be on the response team, when do you need to escalate and to whom?Watch this webinar to learn:How to plan your incident response strategy before you need itWho should be on...
Product Video

Top Trends in Advanced Threats to Sensitive Data in 2019

Your organization regularly faces threats to sensitive data from both inside and outside the organization. The team charged with delivering your information security can tell stories about what they learn from the solutions in place. Digital Guardian manages security programs for hundreds of customers, globally, we see hundreds of stories every day. We see the novel threats that can turn into...
Blog

Sinovel Fined $1.5M in IP Theft Case

Sinovel, a Chinese turbine manufacturer behind one of the decade's classic insider threat cases, was ordered to pay $1.5M by a federal judge last week for the theft of trade secrets.
Blog

What is SCADA Security?

Learn about what SCADA security is, examples of threats and vulnerabilities, and more in Data Protection 101, our series on the fundamentals of information security.
Video

The Real World of Cyber Threat Hunting

Watch our webinar with Senior Director of Cyber Security Tim Bandos to learn about common threat hunting use cases so you can better protect your organization.
Blog

What is File Fingerprinting?

File fingerprinting, also known as data fingerprinting or document fingerprinting, is a technique employed by many network data loss prevention solutions for identifying and tracking data across a network. Read on to learn more about fingerprinting and the security benefits of a DLP solution with data fingerprinting capabilities.