Data Insider’s Top 10 Articles of 2016
Contact Us | |
Free Demo | |
Chat | |
Happy 2017, readers! 2016 was a big year for our blog, with a new look and DATAINSIDER brand, over 250 articles published and nearly half a million readers. Here’s a look back at the top 10 articles published on this blog last year.
10. Detecting and Mitigating USB Propagating Malware (Screenshot Demo)
Global security advocate Thomas Fischer shows off the Digital Guardian endpoint agent’s capabilities when it comes to detecting and stopping USB-based malware in this blog post. While malware has spread via USB for some time now, this vector for attacks and propagation remains a challenge for many security teams today. Check out the post for a look at an actual USB propagating malware attack from the Digital Guardian Management Console’s point of view.

9. Seek Evil, and Ye Shall Find: A Guide to Cyber Threat Hunting Operations
Director of cybersecurity Tim Bandos’ post on threat hunting on a budget was popular due to its tips for getting started with threat hunting and analyzing logs for threat indicators. Tim’s article even offers configuration guides for popular open source tools Logstash and NxLog to help even the most bootstrapped security teams sift through mountains of data and find threats. Check out the post and kick start your threat hunting initiative today!

8. Ransomware Protection & Removal: How Businesses Can Best Defend Against Ransomware Attacks
Ransomware attacks plagued businesses last year, so our interview with a panel of security experts offering advice for ransomware protection and removal was a hit. With tips from 44 security experts on how to protect yourself and your company from ransomware, this article is chock full of must-know information for any internet user today.

7. The Top 10 Biggest Data Breaches of 2015
There was no shortage of data breach incidents in 2015, and our article covering the ten biggest breaches of the year ended up becoming a popular resource for readers seeking a snapshot of the year’s most high-profile security incidents. Check out the list for a look back at those breaches and keep an eye out for our forthcoming recap of the biggest data breaches of 2016.

6. Insider vs. Outsider Data Security Threats: What’s the Greater Risk?
The most popular article from our expert panel interview series focused on the age-old security question: what poses the greater threat to your sensitive data, insiders or outsiders? With 47 data security experts coming from diverse backgrounds ranging from security researchers and analysts to executives and even technology and IP lawyers, the article offers a broad range of perspectives to consider in your own threat analysis.

5. Digital Guardian is a Leader in the 2016 Gartner Magic Quadrant for Enterprise DLP
2016 saw the release of Gartner’s first Magic Quadrant report covering data loss prevention in three years and for the fourth consecutive time we were named a “Leader” in the DLP market. Check out the post for a snapshot of the 2016 MQ for DLP and download the report to get Gartner’s latest analysis of leading data loss prevention solutions.

4. The Anatomy of a CISO: A breakdown of today’s top security leaders (Infographic)
This infographic presented the results of our analysis of CISOs and equivalent security leaders at Fortune 100 companies in a series of data visualizations. Covering everything from education and certifications to previous work experience and tenure in their current positions, the infographic found some interesting trends amongst today’s top security leaders. Check out the graphic for more.

3. Don’t Get Hooked: How to Recognize and Avoid Phishing Attacks (Infographic)
Despite being published in late September of last year, our infographic promoting phishing attack awareness shot to #3 on the list. With examples of many of the common phishing tactics and tips for protecting yourself against them, this infographic was popular with IT/security professionals and end users alike for its comprehensive coverage of one of the most common cybersecurity threats. Check out the infographic and watch out for phishers!

2. Cybersecurity Higher Education: The Top Cybersecurity Colleges and Degrees
Our inaugural roundup of the top colleges and universities for cybersecurity education was a big hit with readers looking to start (or further) their careers in information security. With profiles of over 80 institutions around the world, this article covers the degrees, programs, and scholarship opportunities offered by each, as well as important considerations for applicants like cost and post-graduation hiring rates. Keep an eye out for the 2017 edition of this article with additional schools and updated program information.

1. The Top 50 Must-Attend Information Security Conferences (2016 Edition)
For the second year in a row, our roundup of the top information security conferences happening around the world was our most popular article of the year. After becoming a favorite resource for infosec professionals looking to plan their conference schedules in 2015, we decided to update the article annually, and our 2016 update held strong to the #1 spot. Stay tuned for our 2017 update with the top security events for the year to come!

So there you have it, our top ten posts from last year. This article wouldn’t be complete without a huge thank you to the 465,000+ of you who took time to visit our blog, read some articles, and maybe even share on social media or subscribe. Here’s looking forward to another great year!
Recommended Resources
The Definitive Guide to DLP
- The seven trends that have made DLP hot again
- How to determine the right approach for your organization
- Making the business case to executives
The Definitive Guide to Data Classification
- Why Data Classification is Foundational
- How to Classify Your Data
- Selling Data Classification to the Business