Organizations face many threats to their data systems and information. Knowing all of the fundamental elements to cyber safety is the first step to fulfilling these threats.
The reach of cyber protection is broad. The core regions are explained below, and some other fantastic cyber security plan must take all of them into consideration.
The company alleges a former employee violated company policy and betrayed its trust as he "intentionally decimated" its North American business.
It's the latest in a series of stories involving investigations of suspected intellectual property theft at medical schools and research laboratories.
Companies like Mozilla are using the passage of the CCPA as a way to better empower users to delete their own personal data.
The FBI sounded the alarm around two strains of ransomware, LockerGoga and MegaCortex, shortly before the holiday break.
The European Data Protection Supervisor has issued a preliminary opinion on how data protection obligations should factor into scientific research in the EU.
Deficiencies in the Social Security Administration's ability to protect sensitive data could impact the confidentiality and integrity of its systems and personally identifiable information, a new report says.
In this blog, a complement to our Biggest Incidents in Cybersecurity (in the Past 10 Years) infographic, we look back at some of the biggest moments in cybersecurity history from 2009-2019.
As the adage goes, you can't secure what you can't see. With that in mind we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.
We've compiled 101 Data Protection Tips to help you protect your passwords, financial information, and identity online.
Ignoring the value in behavioral analytics could leave your data vulnerable to attack. We asked 18 security experts why behavioral analysis should factor into your data protection program.
The New York Department of Financial Services' Cybersecurity Regulation was implemented years ago but one of the regulation's compliance deadlines remains.
One privacy bill would override state laws already on the books - like the CCPA - another would only pre-empt laws that conflict with certain provisions.
A new set of guidelines from the European Data Protection Board helps inform data controllers of the safeguards that should be followed when designing data processing activities.
In this Q&A, we sit down with Harlan Carvey, Digital Guardian's new Senior Threat Hunter, to dig into how he approaches threat hunting, incident response, and more.
Digital Guardian is pleased to share that effective today, version 7.6, the latest Data Loss Prevention (DLP) agent for macOS is generally available.
In an advisory published this week, the NSA outlined the risks of Transport Layer Security Inspection (TLSI) and provided security mitigations for organizations.
When he was first detained at the airport, the employee was found with six files containing trade secret data on a storage device connected to his laptop.
In this post, the second of two blogs, Bill Bradley breaks down DG Wingman and Digital Guardian's data protection capabilities.
In this post, the first of two blogs, Tim Bandos helps break down the DFIR tools and processes he uses to carry out investigations.
Yet another Chinese national - this time an employee at an Oklahoma petroleum company - has pleaded guilty to trade secret theft.
Digital Guardian, through its integration with Microsoft, helps extend the value of Microsoft Information Protection capabilities.
As the calendar flips to November, we wanted to take a moment to share how much we’re looking forward to sponsoring this year's Jamf Nation User Conference (JNUC), taking place later this month, from Nov. 12-14, in Minneapolis.
These ex-employees copied company trade secrets onto private storage devices then bragged that their new business would soon be competing with it.
Post-acquisition, Symantec DLP customers looking to reduce vendor uncertainty should take advantage of this exclusive offer.
A man admitted he installed keyloggers at two companies and used them as a launching pad to steal data on emerging technology they were developing.
Two breaches at healthcare providers in Maine recently led to the exposure of 52,000 patients' protected health information.
The data protection commission, one of the world's most vigilant, is disappointed in the government for its smaller-than-expected budget next year.
When it comes to cybersecurity, the insurance industry is subject to a range of regulatory issues. Thanks to the wealth of sensitive data they handle, they're also popular targets of hackers. How can insurance firms best mitigate cybersecurity risks? We asked 20 experts.