Skip to main content

The Digital Guardian Blog's Top 10 Articles of 2015

by Nate Lord on Tuesday August 11, 2020

Contact Us
Free Demo

Happy 2016, readers! 2015 was a big year for the Digital Guardian blog, with over 250 articles published and nearly 200,000 readers. Here’s a look back at the top 10 articles published on this blog last year.

10. A Good Phishing Attack is Worth a Million Zero-Days

The Dridex malware made a comeback in 2015, stealing over $40M from victims in the U.K. and U.S. after being spread through large scale phishing campaigns. On the heels of the Dridex campaign, Digital Guardian researcher Thomas Fischer wrote this article to give examples of common phishing techniques and show how Dridex can be detected and stopped.

9. Oversharing: Your Biggest Security Risk Could be You (Infographic)

October 2015 marked the 12th annual National Cyber Security Awareness Month, and we released this infographic to celebrate the month and drive awareness of the risks of divulging too much personal or company information on social media. Check out the infographic for tips for using social media safely and securely.

8. Detecting CryptoWall 3.0 Using Real Time Event Correlation

Ransomware attacks continued to be a problem through 2015, so Digital Guardian researchers Andy Passidomo and Dimitris Tsapakidis wrote this article with screenshots from the DG lab to demonstrate how CryptoWall 3.0 can be detected based off of behavioral correlation.

7. The History of Data Breaches

Keeping track of data breach news in a year that saw breach after breach proved challenging; this article offers an overview of some of the biggest data breaches of all time and provides a historical overview of the growing data breach issue.

6. Know Your Network First: DNS and the Power of Feature Classification

This guest post from security researcher Lance James is a must-read for security professionals tasked with building or managing threat intelligence programs at their companies. From basic domain name categorization to in-depth analysis of malicious domains, Lance’s post offers a great introduction to network threat intelligence.

5. Which U.S. States Get Hacked the Most? Mapped: Hacking Attacks Across the Nation

Readers loved this interactive infographic for its visual breakdowns of hacking attacks against users around the U.S. Check out the article for the most hacked states and a history of malware attacks.

4. Phishing Attack Prevention: How to Identify & Avoid Phishing Scams

This article features a panel of security experts weighing in on how businesses fall victim to phishing attacks and what can be done to protect against them. The experts’ responses provide examples of a wide range of different phishing techniques and provide tips to help end users better recognize and avoid phishing attacks.

3. 101 Data Security Quotes: Experts on Breaches, Policy, News & More

This massive post offers a selection of 101 important quotes spanning many facets of data security. Check out the list for helpful tips on computer and mobile device security, protection against malware and social engineering attacks, and secure habits for various online activities.

2. Data Security Experts Reveal the Biggest Mistakes Companies Make with Data & Information Security

The most popular post from our expert panel series features 30 information security experts discussing the biggest and most common mistakes companies make in their data security efforts. From neglecting employee security training to taking a “silver bullet” approach, this article covers a host of security pitfalls to avoid in your own data security program.

1. The Top 50 Must-Attend Information Security Conferences

Last January we published our roundup of the top 50 information security conferences happening around the world in 2015. The post ended up being a favorite resource for infosec professionals looking to plan their conference schedules for the year. Stay tuned for our 2016 update with the top events for the year to come!

Tags:  Data Security

Recommended Resources

The Definitive Guide to DLP

All the essential information you need about DLP in one eBook.

The Ultimate Guide to Data Protection

Everything you need to know about data protection but were afraid to ask.