Resources

Blog

Compromising Emanations

Manipulating sound waves to open a vector for data exfiltration seems like the stuff of science fiction - but based on recent research, the technique is quite plausible.
Blog

What Is Personally Identifiable Information?

Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks. Read on to learn how to better protect PII from unintentional exposure.
Blog

5 Steps to Prevent Sensitive Data Loss

Ashley Madison is just the latest company to lose gigabytes of customer data in a high profile breach. How can companies protect their information in the face of cyberattacks?
Blog

What is NIST Compliance? (Checklist, Definition, & More)

The NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high tech industries today.
Blog

Six Questions about Application Whitelisting & Advanced Threats

Learn more about app whitelisting in a short question and answer session with Chris Sherman of Forrester and John Fox of Digital Guardian. This Q&A was taken from our webinar, “Why Application Whitelisting is Essential for Advanced Threat Defense.”
Blog

DDoS As a Cover for Data Theft

Distributed denial of service attacks are IT teams' worst nightmare - but they may be the least of your problems, experts say.
Blog

18 Questions about Splunk and Digital Guardian

Here are 18 great questions about our integration with Splunk (and other SIEMs), answered by Tony Themelis, VP of Product Strategy here at Digital Guardian. This Q&A was taken from our webinar, “How Splunk + Digital Guardian Protect Data from Advanced Threats.”
Blog

ATF Official Caught Leaking Employee Data

CNN reports that an executive at the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) was sending personnel data to a personal email account.
Blog

8 Tips for Securing Your Mobile Device

Mobile devices have become part of our everyday lives. While using these devices, whether it be a smartphone, tablet, or laptop, you are at risk of being a victim of a cybercrime. Here are some tips you can use to safeguard your devices against impending attacks.