Juliana de Groot
Juliana is a former Senior Marketing Operations Specialist at Digital Guardian. Prior to joining Digital Guardian, she worked at Dell and CarGurus.
Our platform, available as a SaaS or managed service, makes it easier to see, understand, and block threats to your sensitive information.
Digital Guardian's Blog
Juliana is a former Senior Marketing Operations Specialist at Digital Guardian. Prior to joining Digital Guardian, she worked at Dell and CarGurus.
Threat intelligence is all about collecting data, information that can keep you apprised of potential threats. What are the most critical components of threat intelligence? We asked 24 experts.
34 infosec experts discuss how to prevent the most common social engineering attacks.
Threat analysis tools with updated intelligence feeds have become an essential part of defenders' toolkits. In this blog, we look at 50 threat intelligence tools that can help teams better protect their business.
The National Institute of Standards and Technology's Cybersecurity Framework is designed to help organizations manage their security risk; in this blog we'll go over its requirements, penalties for failing to comply with it, and best practices.
In our latest group interview, we asked 21 experts and business leaders what they think the most important thing for companies to keep in mind about managed detection and response costs is.
Learn about data security and the role it plays in many data protection solutions in Data Protection 101, our series on the fundamentals of data security.
Learn about how security operations centers work and why many organizations rely on SOCs as a valuable resource for security incident detection.
Many companies are requiring employees to work from home and use collaboration software to communicate. What are the best ways to mitigate risks in collaboration software? We asked 27 experts their best practices.
SOC 2 is a set of compliance requirements for companies that use cloud-based storage of customer data. Learn about the basics of SOC 2 and best practices in this week's Data Protection 101!
Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.