What is the CCPA and What’s Needed for Compliance?
You've heard of the CCPA but what are the costs of noncompliance? We answer those questions and look at how organizations can use a DLP solution to help facilitate CCPA compliance in this blog.
Friday Five: The U.S. Operation Against QakBot, Cybercrime Treaty and Water Infrastructure Concerns, & More
The operation against QakBot marks a cybersecurity win for the U.S., but concerns over critical infrastructure, data privacy, and cyber insurance largely overshadow it. Catch up on these stories and more in this week’s Friday Five.
Friday Five: Vulnerability Disclosure, Malicious QR Codes, Social Media Giants Challenged, & More
Between malicious QR codes, ransomware, and new legislation that would require increased vulnerability disclosures, organizations have a lot to pay attention to in this week's headlines. Catch up on it all in this week’s Friday Five!
Securing Your Data, For Now and Forever
In this blog, we ask six data protection experts how modern organizations can protect their data now and in the future.
Navigating the Australian Privacy Act 1988: Implications and Preparedness for Organizations
The Australian Privacy Act 1988 has been a cornerstone in protecting Australians’ privacy rights and governing how personal information is collected, used, and managed by organizations. Here you’ll find more about what the Privacy Act is and how it could impact you or your organization.
Friday Five: Cloud Security Concerns, LinkedIn Users and Young Gamers Targeted, & More
Hacks, social engineering, and phishing dominated this week’s headlines, but cloud security is at the forefront of government officials’ minds. Catch up on all the latest in this week’s Friday Five!
Do you need DLP? Well, do you feel lucky?
Welcome to the first in a series of blogs highlighting Digital Guardian’s recently released eBook, The Definitive Guide to Data Loss Prevention. This post focuses on the commonly asked question of “Do I need DLP?” and covers the driving forces behind DLP adoption.
How Data Sovereignty Made Data Protection King
The concepts of data protection and data sovereignty have become even more intertwined and crucial of late, especially in cloud computing environments.
Bad Bots: Understanding Bad Bots, What They Do, and How to Detect & Stop Them
Bad bots, malicious programs and applications designed to deface websites and carry out DDoS attacks, can negatively impact a company's business.
Friday Five: The Updated NIST Framework, Surging Cyberattacks, Red-Teaming AI, & More
With an uptick of cyberattacks against government agencies comes a wave of new cyber frameworks, guidance, and regulations. Catch up on all the latest in this week’s Friday Five!
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!