Resources

Blog

Friday Five: The Next Wave of Regulatory Compliance, Election Scams, & More

CISA Sees Elimination of 'Bad Practices' as Next Secure-by-Design Step by Matt BrackenThe Cybersecurity and Infrastructure Security Agency (CISA) has made significant strides in its secure-by-design initiative, gaining 230 software vendors' commitments to strengthen security features like multi-factor authentication and reducing default passwords. By shifting security responsibilities to software...
On-Demand Webinar

Protecting Pokemon's Most Critical IP

Watch this webinar to learn how Fortra's data-centric Secure Collaboration tool protects Pokemon’s most critical IP.
Blog

What Is the General Data Protection Regulation (GDPR)?

The General Data Protection Regulation (GDPR) is a regulation enacted by the European Union to protect EU citizens' privacy and personal data. Read this blog to learn more about who's subject to GDPR compliance, data subject rights, and the misconceptions around consent in GDPR compliance.
Blog

Understanding Saudi Arabia's NDMO Standards

As governments transition to fully digital records, protecting sensitive data has become a critical priority. In the Middle East, Saudi Arabia is leading the way with its National Data Management and Personal Data Protection Standards.
Guide

Achieving NYDFS Cybersecurity Compliance

This eBook explains the ten key provisions that go beyond federal cybersecurity requirements, and how Digital Guardian can help you achieve and maintain compliance.
Guide

Meeting Stringent HIPAA Regulations

Get this guide to learn the important aspects of the Health Information Portability and Accountability Act (HIPAA) and how an appropriate Data Loss Prevention solution can help healthcare organizations prevent hefty HIPAA violation fines.
Guide

5 Practical Tips to Protect Manufacturing Trade Secrets

Get tips from former DuPont CISO Larry Brock on making the case for investment in IP protection and establishing a holistic program. Learn approaches to calculating the true cost of IP theft and how to protect your sensitive data from cyber threats.