Infographic: Is Security Spending Proportional to the Data Breach Problem?
Einstein famously defined insanity as "doing the same thing over and over again and expecting different results." So why do companies continue to follow the same archaic security strategies while data breaches are at an all-time high?
4 Reasons Why Midsize Businesses Should Care About Data Protection
As midsize businesses become a top target for cyber criminals, customers and regulators are calling for bolstered data protection efforts at the midmarket level. Check out the infographic to learn why and get tips for securing data at midsize companies.
Buying A Breach: Pacnet’s Dirty Little Secret
When the Australian telco Telstra purchased Pacnet for US$697 million earlier this year, the idea was to expand its reach in Asia. Instead, it ended up buying a controlling stake in a massive data breach.
Sally Beauty: When one Breach Begets Another
The beauty supply store acknowledged today that it was the victim of yet another data breach – the second in as many years. But where does one incident end and another begin?
It's on! Vote on our Sales vs. Marketing Video Throwdown
Sales and marketing are at it again! The competitive nature at Digital Guardian has led to a friendly video competition between our sales and marketing teams.
Even After Breaches, Convenience Trumps Security In Payments
A survey by the Ponemon Institute and Experian suggests that consumer convenience is still the number one consideration driving technology adoption in the payments industry… even when it might adversely affect security.
FCC, AT&T Reach $25M Settlement Over Insider Data Breach
FCC is on the data breach case, fining AT&T $25M for an insider data breach that took place from 2013-2014.
The 10 Smartest Things to Do at the RSA Conference
RSA is nearly here, so check out my top 10 tips for getting the most out of your conference experience!
Can you "leak" public information?
The personal information on world leaders attending the G20 summit was accidentally released to a third party. Is it a data breach? Maybe not.
Vote for Digital Guardian's Crowdsourced RSA Speaker Sessions
Voting is open until April 2 for RSA's Crowdsourced speaker sessions - be sure to vote for Ken Levine and Mark Stevens' sessions!
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!