“We Didn’t Know” Is Not a Best Effort Answer…
Today, companies need to demonstrate that they're making a “best effort” to manage the data they oversee; Digital Guardian's new SSE solution provides the information needed to manage data loss risk.
Unstructured Data Sprawl? Time For Digital Guardian Secure Service Edge
Too many cloud apps? Digital Guardian Secure Service Edge (SSE) can help organizations better understand and manage unstructured cloud sprawl.
Friday Five: AI Threats and Vulnerabilities, the Zero-Day Problem, MFA Fatigue, & More
While research suggests cybersecurity measures are mitigating Zero Day threats more effectively, threat actors are getting better at exploiting the threats that remain. Meanwhile, cyber threats related to AI continue to emerge, and CISA is refining its incident reporting requirements. Get up to speed on these stories and more in this week's Friday Five.
Friday Five: Water Sector Attacks, a Bill Targeting Data Brokers, & More
More warnings about attacks against U.S. critical infrastructure surfaced this past week, along with global and domestic AI roadmaps, a new bill to protect Americans' data privacy, and more. Catch up on it all in this week's Friday Five.
What is ITAR Compliance? How It Works, Best Practices & More
Complying with International Traffic in Arms Regulations (ITAR) is key for U.S. government, manufacturers, exporters, and brokers of defense data. Learn how ITAR compliance works and what's regulated in this blog.
What Is Data Residency? How It Affects Your Compliance
Data residency refers to the physical or geographical location where an organization's data is stored to servers, databases, or data centers. Learn more about data residency in today's blog.
Friday Five: New Federal Compliance Requirement, a Russian Hacking Spree, & More
This past week's InfoSec headlines were dominated by a high-profile, Kremlin-backed cyberattack, CISA and the OMB's new attestation form, the so-called "TikTok Bill," and more. Catch up on all the latest in this week's Friday Five!
What Is Data Auditing? Why You Need It & How to Conduct It
Data auditing is the process of conducting a thorough review and analysis of a company's data to ensure its accuracy, consistency, and security. Learn more about why your organization needs to carry out data auditing in today's blog.
Friday Five: Zero-Trust Guidance, IP Theft, Surging Cybercrime, & More
An FBI report on rising cybercrime topped this week's headlines and was further underscored by an IP theft scandal at Google, but new initiatives from the White House and NSA aim to combat such threats. Get up to speed on these stories and more in this week's Friday Five!
What Is Enterprise Data Management (EDM)? How It Works
Enterprise Data Management (EDM) is a comprehensive approach to defining, integrating, and retrieving data in an organization.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!