Resources

Blog

5 Criteria for Choosing the Right Managed Security Services Provider (MSSP)

Organizations can choose to work with an MSSP for several reasons, such as security talent shortages, restricted IT budgets, the complexity of staying on top of sophisticated threats and a bewildering number of technology choices. Part 9 of our Definitive Guide to Data Loss Prevention series provides 5 criteria for selecting the right MSSP for your business.
Blog

The Evolution of an Insider Threat: How a Business Analyst Turned into a Rogue Hacker

The Advanced Threat & Analysis Center (ATAC) team here at Digital Guardian are on high alert for any suspicious activity that is generated from our customer environments through our Managed Service offering. Most times we’ll detect external cyber-attacks and/or intrusions, however recently we came across a rather interesting finding that was almost too good not too share with our readers.
Blog

Positioning DLP for Executive Buy-In

Data protection projects involve several departments within an organization, from IT to marketing. Learn how to build allies and properly position DLP to decision makers in part 8 of our series, The Definitive Guide to DLP.
Blog

Building a value-based business case for DLP

You understand the need for data protection, but how do you pitch that idea internally to get the political and financial support that you need? The key to making a value-based business case lies in positioning DLP initiatives in terms that executives will understand. Learn more in part 7 of our Definitive Guide to Data Loss Prevention series.
Blog

All Trends Lead to Data-Centric Security

As traditional approaches to security become less effective, enterprises are shifting towards a security model that focuses on data protection at its core. Learn more about this shift to data-centric security in part five of our series, The Definitive Guide to Data Loss Prevention.
Blog

The Internet of Dumb Things

The Internet of Things, along with being one of most profoundly stupid phrases of all time, is also profoundly broken from a security perspective. Your dishwasher and your car are probably several firmware versions out of date, and your light bulbs are likely communicating with your smart home hub over a cleartext connection. It’s ugly out there.