Organizations face many threats to their data systems and information. Knowing all of the fundamental elements to cyber safety is the first step to fulfilling these threats.
The reach of cyber protection is broad. The core regions are explained below, and some other fantastic cyber security plan must take all of them into consideration.
The Department of Justice this week peeled back more layers on the North Korean military hacking unit Lazarus Group and its longtime cybercrime spree.
A new lawsuit alleges four attorneys plotted their exit months before they left for a competing firm, then copied and destroyed corporate data.
The FBI reiterated that using end-of-life operating systems and desktop sharing software can open the doors for attackers, like in the Oldsmar water treatment plant hack.
COVID-19 has led to increased fraud activity; one of the latest campaigns has seen cybercriminals stealing data from public-facing insurance websites.
Like California before it, New York could serve as the testing grounds for the next statewide consumer data privacy law.
Digital Guardian was named a top place to work in the United States in 2021!
The hack is another example of how damaging cyber attacks against small cities and infrastructure can be.
Virginia is right on California's heels; the state may adopt its own consumer data privacy act - leading to more stringent data protection - later this month.
It wasn't until after the employee left that the company realized how many proprietary files he'd transferred to his personal email accounts and thumb drives.
NIST has released new tools for defenders to protect sensitive information and mitigate state-sponsored hackers.
China's voracious collection of U.S. healthcare data, including DNA, can pose a national security risk, not to mention harm the privacy of Americans.
A bill aimed at increasing economic penalties for companies that actively seek to steal US intellectual property is headed to the House of Representatives.
If enacted, new federal rules would require banks to inform their primary federal regulator as soon as possible following a computer security incident.
A new advisory highlights the risk of PRC government-sponsored data theft.
The guidelines are supposed to help data controllers when it comes to deciding how to handle data breaches and what factors to consider during risk assessment.
The FBI is again warning organizations of increased voice phishing - vishing - attacks targeting teleworkers.
Eliminating old, out-of-date encryption protocols can protect sensitive and valuable data from being accessed by adversaries, the NSA reiterated this week.
The travel company Sabre has agreed to pay $2.4 million and make changes to its cybersecurity policies following a 2017 data breach that exposed 1.3 million consumer credit cards.
NIST's latest guidance is geared towards preventing healthcare organizations that oversee PACS software from exposing patient data.
Threat analysis tools with updated intelligence feeds have become an essential part of defenders' toolkits. In this blog, we look at 50 threat intelligence tools that can help teams better protect their business.
Forrester’s practical and actionable Informational Security Maturity Model - and Digital Guardian - can help organizations gauge their information security program.
The National Institute of Standards and Technology's Cybersecurity Framework is designed to help organizations manage their security risk; in this blog we'll go over its requirements, penalties for failing to comply with it, and best practices.
In our latest group interview, we asked 21 experts and business leaders what they think the most important thing for companies to keep in mind about managed detection and response costs is.
The potential updates to the data privacy law build off of others proposed in October.
A global intrusion campaign involving the company’s IT monitoring and management software could date back to March.
The news, while familiar, is yet another reminder of the importance of securing critical patient data.
Attackers have been actively exploiting a recently uncovered command injection bug in VMware products to access protected data.