Juliana de Groot
Juliana is a former Senior Marketing Operations Specialist at Digital Guardian. Prior to joining Digital Guardian, she worked at Dell and CarGurus.
Our platform, available as a SaaS or managed service, makes it easier to see, understand, and block threats to your sensitive information.
Digital Guardian's Blog
Juliana is a former Senior Marketing Operations Specialist at Digital Guardian. Prior to joining Digital Guardian, she worked at Dell and CarGurus.
Learn more about data loss prevention software in Data Protection 101, our series covering the fundamentals of data security.
With industrial espionage on the rise, we asked 24 manufacturing experts the best ways to protect intellectual property at manufacturing firms.
Learn about cyber security, why it's important, and how to get started building a cyber security program in this installment of our Data Protection 101 series.
Many infosec conferences are going virtual in 2020 due to the COVID-19 pandemic. Is your favorite conference going virtual? Check out our list of events and update your calendar!
Learn about data breach insurance, why it's important, how it works, and what to look for in a policy in the latest Data Protection 101, our series on the fundamentals of information security.
What is cyber insurance? Get a definition, learn why it's important, how it works, best practices, and more in this week's Data Protection 101, our series on the fundamentals of information security.
In this blog, a complement to our Biggest Incidents in Cybersecurity (in the Past 10 Years) infographic, we look back at some of the biggest moments in cybersecurity history from 2009-2019.
What a cloud access security broker, or CASB? Learn about the benefits, best practices, and use cases in this week's Data Protection 101, our series on the fundamentals of information security.
Learn about identity and access management (IAM), how IAM works, and why organizations should have IAM in Data Protection 101, our series on the fundamentals of information security.
As the adage goes, you can't secure what you can't see. With that in mind we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.