Top Data Vulnerabilities that Cause Data Loss
In this blog we take a high level look at some of the vulnerabilities or flaws in a system that can lead to data loss, the stages of exploiting a vulnerability, the impact, and how to best safeguard your data against vulnerabilities.
Friday Five: Insider Threats, Compliance Woes, Fighting Espionage, & More
In this week's Friday Five, learn how internal threat actors are finding success, the U.S. and allies are fighting foreign espionage campaigns, a new bill could fortify the U.S. cybersecurity workforce, and more.
3 Data Masking Techniques and How to Implement Them
Data masking or data obfuscation has become a popular way to modify data to make it difficult to ascertain what's authentic vs. what's been modified. In today's blog we look at three different data masking techniques.
Friday Five: FCC Combating Malware and Cybercrime, Mac Malware, & More
Despite the recent dismantling of a ransomware gang, malware remains on the rise and the FCC is making moves to combat cybercrime. Catch up on the latest in this week's Friday Five!
Friday Five: Threats to Critical Infrastructure, New Actively Exploited Bugs, & More
As cyber attacks and data breaches are on the rise, federal agencies are warning of several new and persisting threats. Learn all you need to know in this week's Friday Five.
Understanding the Combined Power of Data Loss Prevention (DLP) and Secure Collaboration
Leveraging DLP with Digital Guardian Secure Collaboration can help organizations control their data regardless of where it lands.
Friday Five: Ransomware Gangs Taken Down, a Rise in Zero-Day Exploitation, & More
While two ransomware gangs were taken down this past week, an increase in zero-day exploitations and shifting tactics by Gootloader and Jupyter are keeping enterprises on their toes. Catch up on these stories and more in this week's Friday Five!
Friday Five: Governments Cracking Down on Breaches and Ransomware, SolarWinds CISO Charged, & More
A recent spike in ransomware has prompted dozens of countries to agree to stop paying ransoms. Meanwhile, the FTC is amending its data breach reporting rules, CISA may be seeing budget cuts, and a high-profile CISO was charged with fraud. Catch up on it all in this week's Friday Five!
What Is Sensitive Information? How to Classify & Protect It
Curious how sensitive information differs from personal information? We break down examples, what can happen when that data is exposed, and best practices for protecting sensitive data in this blog.
Friday Five: Hacking Groups Ramping Up Efforts, Apple's Broken Promise, & More
This past week's headlines detail how threat actors are taking advantage of ongoing conflict, violent threats, and shifting tactics. Stay up-to-date on the latest in this week's Friday Five!
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!