Blog

Blog

What Does an Insider Threat Analyst Do?

Learn about what an insider threat analyst does, along with how they affect existing procedures, policies, and protection layers in organizations in Data Protection 101, our series on the fundamentals of information security.
Blog

The Early Indicators of an Insider Threat

Whether malicious or negligent, insider threats pose serious security problems for organizations. Forrester Senior Security Analyst Joseph Blankenship offers some insight into common early indicators of an insider threat.
Blog

Three Key Challenges Driving the Resurgence of DLP

Why are companies becoming more and more interested in Data Loss Prevention (DLP) solutions? Forrester’s senior analyst, Heidi Shey, explains why a DLP resurgence has occurred in the past few years and mentions some of the key criteria for evaluating DLP Suites.
Blog

Why Your Employees are a Bigger Threat than Hackers

Global cybercrime costs could reach $2 trillion by 2019. That’s up 3X from 2015, which was only a paltry $500 billion by comparison. Surprisingly, though, hackers should be the least of your worries.
Blog

How to Evaluate DLP Solutions: 6 Steps to Follow and 10 Questions to Ask

Evaluating and selecting a new solution is always an undertaking, but following a standard framework and criteria set for each solution you’re considering will help simplify the process. Part 10 of our "Definitive Guide to Data Loss Prevention" series provides six steps and ten criteria to guide this process.
Blog

5 Criteria for Choosing the Right Managed Security Services Provider (MSSP)

Organizations can choose to work with an MSSP for several reasons, such as security talent shortages, restricted IT budgets, the complexity of staying on top of sophisticated threats and a bewildering number of technology choices. Part 9 of our Definitive Guide to Data Loss Prevention series provides 5 criteria for selecting the right MSSP for your business.
Blog

The Evolution of an Insider Threat: How a Business Analyst Turned into a Rogue Hacker

The Advanced Threat & Analysis Center (ATAC) team here at Digital Guardian are on high alert for any suspicious activity that is generated from our customer environments through our Managed Service offering. Most times we’ll detect external cyber-attacks and/or intrusions, however recently we came across a rather interesting finding that was almost too good not too share with our readers.
Blog

Positioning DLP for Executive Buy-In

Data protection projects involve several departments within an organization, from IT to marketing. Learn how to build allies and properly position DLP to decision makers in part 8 of our series, The Definitive Guide to DLP.
Blog

Building a value-based business case for DLP

You understand the need for data protection, but how do you pitch that idea internally to get the political and financial support that you need? The key to making a value-based business case lies in positioning DLP initiatives in terms that executives will understand. Learn more in part 7 of our Definitive Guide to Data Loss Prevention series.
Blog

All Trends Lead to Data-Centric Security

As traditional approaches to security become less effective, enterprises are shifting towards a security model that focuses on data protection at its core. Learn more about this shift to data-centric security in part five of our series, The Definitive Guide to Data Loss Prevention.
Blog

Debunking the Three Myths of DLP

With data loss prevention back in the limelight, there are a few myths that we’d like to dispel in part three of our Definitive Guide to DLP series.