Organizations face many threats to their data systems and information. Knowing all of the fundamental elements to cyber safety is the first step to fulfilling these threats.
The reach of cyber protection is broad. The core regions are explained below, and some other fantastic cyber security plan must take all of them into consideration.
The attacks are just a fraction of the 400 victim organizations worldwide, according to the FBI.
A recent report looked at the average costs incurred by the healthcare sector following a ransomware attack.
Two weeks removed from the Colonial Pipeline incident, bipartisan House lawmakers introduced five different acts designed to better secure federal critical infrastructure from cyberattacks.
With another new bill proposed in the state, New York has positioned itself to become a powerhouse in the data privacy space, challenging California when it comes to cybersecurity legislation on the books.
A ransomware attack against one of San Diego's main healthcare systems has lasted for 12 days so far, resulting in lab test delays and forcing doctors and nurses to use pen and paper.
For the second year in a row, we’re thrilled to share that Digital Guardian has been named as the industry’s best DLP solution by SC Media!
To reduce malicious cyberattacks against operational technology (OT) following last year's SolarWinds attack, the National Security Agency has released evaluation methodology for network owners.
Threat intelligence is all about collecting data, information that can keep you apprised of potential threats. What are the most critical components of threat intelligence? We asked 24 experts.
The new guidance highlights software supply chain risks and tips on how to identify, assess, and mitigate risks.
The $3M penalty is the largest published assessment to date for alleged violations of the Cybersecurity Regulation.
A ransomware attack late last week took down a major U.S. pipeline but the company says its making incremental progress bringing things back online.
Find Digital Guardian at our virtual booth in the Digital Expo or attend one of our sessions!
If it gains traction and passes, the bill would supersede most state privacy laws already on the books.
The request comes as part of a multi-pronged effort, including sanctions, financial penalties, and expulsions, coordinated by the U.S. against Russia.
The bugs, discovered by the NSA, "could allow persistent access and control of enterprise networks."
Following a malware attack last week, systems in some states will be offline for the remainder of the week.
We're excited to share that Digital Guardian has again made the SC Awards Trust Awards shortlist for Best Data Loss Prevention (DLP) Solution!
The FBI provided technical details on the ransomware strain along with indicators of compromise and domains associated with its activity on Tuesday.
In a new lawsuit, one company is alleging a former employee stole sensitive trade secrets to help his new company, a would-be competitor, manufacture a lucrative drug.
When it comes to building a mature security awareness program, money isn't the biggest challenge.
While only 21, the Swiss "hacktivist" has hacked dozens of companies and published data like source code, files, and other proprietary information online.
Four new policy packs can help customers better control file movement across popular collaboration software like Microsoft Teams, Slack, Zoom, and Skype.
Microsoft said Tuesday that attackers operating out of China have been exploiting four zero days in Microsoft Exchange enterprise email servers to steal email and that administrators should patch systems immediately.
The company's CISO acknowledged the breach to the supervisory authority only after it asked and 18 months after it happened.
International Women's Day is a time to reflect on progress made and ask ourselves what more we as a company can do to lift women’s voices.