Blog
6 Ways to Keep Your Kids Safe Online
Wed, 03/02/2016
As children are increasingly targeted in online attacks, parents must take steps to instill secure computing habits and protect their kids' devices. Here are 6 tips for keeping your kids safe online.
Blog
The Third Party Data Breach Problem
Mon, 02/29/2016
Data breaches via third parties are a growing problem impacting companies across many industries – and one that can be even more difficult to defend against. How can companies secure their assets against cyber attacks that target suppliers and partners or use information stolen in previous breaches?
Blog
Six considerations for mitigating risk in IoT devices
Wed, 02/24/2016
IoT technology is in its infancy, yet has already developed a reputation for poor security. As connected devices become more engrained in our day to day business and personal lives, producers of IoT technology should follow these six tips to shore up IoT security.
Blog
Building a Data-Centric Security Architecture from the Ground Up: A Customer Story
Tue, 02/23/2016
Establishing a data protection program doesn't have to be a long or tedious process - here's the story of a customer who was able to quickly build a data security program based on three key initiatives.
Blog
Judge in Anthem Case Rules That Breach Harmed Patients
Thu, 02/18/2016
The legal wrangling over whether data breaches cause harm to consumers continued this week, with a District Court ruling in a case involving health insurer Anthem.
Blog
What is Cloud Storage Security? Securing Cloud Storage Usage
Mon, 02/08/2016
As cloud adoption continues to grow rapidly at the enterprise level, IT and security departments must provide for secure use of cloud storage and services.
Blog
The Cost of a Data Breach? $88 Million
Thu, 02/04/2016
There’s a lot of debate about how much data breaches and hacks cost companies – except when there’s not, as with the hack of UK firm TalkTalk, which put the cost at around $88 million.
Blog
Detecting and Mitigating USB Propagating Malware (Screenshot Demo)
Wed, 02/03/2016
Put those hot glue guns away – here’s how to detect and mitigate USB propagating malware.
Blog
Digital Guardian is a Leader in the 2016 Gartner Magic Quadrant for Enterprise DLP
Thu, 01/28/2016
For the fourth consecutive time, Digital Guardian has been selected as a “Leader” in the Gartner Magic Quadrant for Enterprise Data Loss Prevention.* Read the 2016 edition now.
Blog
Drug Development and Intellectual Property Theft
Tue, 01/26/2016
Competitive forces in the pharmaceutical industry have led to increased intellectual property theft. As this trend continues, pharmaceutical companies and manufacturers of all industries must focus on protecting the sensitive data that their competitive advantage is built on.
Blog
Criminalizing the Crime: Punishing Data Theft
Thu, 01/21/2016
A convicted hacker in Turkey received a 334-year sentence for data theft, while a UK official calls for stronger sentences there.
Blog
WIPOut: The Devastating Business Effects of Intellectual Property Theft
Wed, 01/20/2016
A recent 60 Minutes feature told of China’s current cyber-espionage campaign that stole one company’s intellectual property in its near entirety. As China’s campaign continues targeting U.S. companies across every industry, those companies must take steps to protect IP and preserve their competitive advantage.
Blog
What is FTP Security? Securing FTP Usage
Mon, 01/18/2016
File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
Blog
The Top 10 Biggest Data Breaches of 2015
Wed, 01/13/2016
Here’s a look back at the top ten biggest data breaches in 2015.
Blog
Healthcare Security: Understanding HIPAA Compliance and its Role in Patient Data Protection
Mon, 01/11/2016
After the "year of the healthcare breach," many healthcare organizations are taking steps to improve their data protection strategies to meet regulatory requirements and secure health information against costly data breaches. Here's an overview of the data protection requirements for compliance and beyond.
Blog
Missing in Michaels Data Breach: Harm To Consumers
Thu, 01/07/2016
A federal judge throws out a lawsuit against the craft store Michaels after plaintiffs fail to prove that any damages occurred as a result of the leak.
Blog
Behind the Curtain: The Path to Becoming a Leader in a Gartner Magic Quadrant
Wed, 01/06/2016
In anticipation of the soon-to-be-released Gartner Magic Quadrant for Enterprise Data Loss Prevention, here's a behind the scenes look at the submission process.
Blog
Optimizing Your Data Protection: Part One
Tue, 12/29/2015
This two-part series features Q&A sessions with Tony Themelis, VP of Product Strategy at Digital Guardian, on how organizations can optimize their data protection programs. Here’s the first installment.
Blog
New Tech for the Holidays? Here's How to Securely Wipe Old Devices Before Donating
Tue, 12/22/2015
Donating old technology is a great practice - rather than disposing of devices simply because you don't need them, donating lets those devices go to those who will still benefit from their use. However, it's important to securely wipe devices before donating to ensure that your personal data stays private.