Nate Lord
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
Our platform, available as a SaaS or managed service, makes it easier to see, understand, and block threats to your sensitive information.
Digital Guardian's Blog
Nate Lord is the former editor of Digital Guardian's Data Insider. He has over 7 years of experience in the information security industry, working at Veracode prior to joining Digital Guardian in 2014.
Last month the Ponemon Institute released its annual Cost of Cybercrime report covering damages from cybercrimes in the past year. Here are some of the key findings.
Don’t let concerns over cloud security risks prevent your organization from reaping the benefits of cloud computing. Use this 8 step framework to secure your organization’s cloud adoption efforts.
Halloween is almost here – while this weekend will be full of ghosts and ghouls, the threats that may already exist in your IT environment can be even scarier. Here are the top threats that could be lurking in your environment and how to defend against them.
File fingerprinting, also known as data fingerprinting or document fingerprinting, is a technique employed by many network data loss prevention solutions for identifying and tracking data across a network. Read on to learn more about fingerprinting and the security benefits of a DLP solution with data fingerprinting capabilities.
We've released an interactive challenge in celebration of National Cyber Security Awareness Month. Take our Security Acronym Acumen Quiz today and challenge your friends to beat your score!
Learn about common uses for network data loss prevention solutions, from insider threat protection to compliance.
Are your social media habits putting your private data - or your company's - at risk? Learn about the risks of oversharing and get tips for using social media securely in this infographic.
We'd like to extend a warm welcome to Code Green Networks' employees as they join Digital Guardian.
Learn how public key cryptography works as well as common uses for this cryptographic method.
As we near the last quarter of 2015, here’s a look at the four of the year’s top trends in cybersecurity (so far).