Resources

Blog

What is a Data Classification Policy?

Learn about data classification policies, benefits, examples, and best practices, in this week's Data Protection 101, our series on the fundamentals of information security.
Blog

California Passes Rigorous New Data Privacy Bill

California passed a sweeping data privacy bill on Thursday believed to be the strictest in the nation. The law will give consumers the ability to ask what data companies have on them and to sue over data breaches.
Blog

Managed Security Programs: Specialized vs. Generic

Considering a Managed Service Program for Data Loss Prevention? Learn the difference between legacy MSSP and Digital Guardian's MSP, and determine which tasks need to be managed in-house and which tasks need to be outsourced.
Blog

74 Arrested in FBI, DOJ BEC Scam Takedown

74 individuals were arrested over the last two weeks for their role in Operation Wire Wire, a law enforcement effort carried out by the FBI to disrupt a multi-million dollar business email compromise (BEC) scam campaign.
Blog

Emerson Owes BladeRoom $30M in IP Theft Case

A jury ruled that Emerson Electric stole proprietary data center designs from BladeRoom, putting a close to a long running trade secrets lawsuit. The ruling comes a month after Facebook settled with the British manufacturing firm over similar charges.
Blog

What is COBIT?

Learn about Control Objectives for Information and Related Technologies, or COBIT, the goals of the framework, the benefits, how it can help companies meet compliance, and more in Data Protection 101, our series on the fundamentals of information security.
Blog

50 Information Security Influencers You Should Be Following

A significant portion of an infosec pro's workweek is devoted to keeping up with all things cyber, from new threats to new tools. Following influencers on their blogs, social media, and other online presences helps us stay up-to-date with the latest in infosecurity.
Blog

How Does UEBA Protect Against Insider Threats?

Learn about how User and Entity Behavior Analysis, or UEBA, works and how it leverages machine learning to help mitigate insider threats, password attacks, and more in Data Protection 101, our series on the fundamentals of information security.