Black Hat 2018

<img src="/sites/default/files/Blackhat-logo.png"> Join Digital Guardian at Black Hat 2018! - Read more

DG CUE 2018

DG CUE - Read more

Analyst Insights – Building An Efficient Data Security Program with Forrester

Analyst Insights – Building An Efficient Data Security Program This webinar was recorded on May 17, 2018. - Read more

Gartner Security & Risk Management Summit 2018

Gartner Security & Risk Management Summit 2018 June 4th – 7th | National Harbor, MD - Read more

FS-ISAC 2018 Summit

<img src="https://info.digitalguardian.com/rs/768-OQW-145/images/fsi-isac-logo.png"> Digital Guardian will be presenting and exhibiting in Booth #69.Get tools, tips and recipes from our threat hunting experts. Boca Raton |...

Analyst Insights – The 4 Questions for GDPR Success

Bloor Research Analyst Insights – The 4 Questions for GDPR Success This webinar was recorded April 26, 2018. - Read more

Netskope

<img src="/sites/default/files/NET_horizontal_fullcolor.png"> DG and Netskope for enterprise DLP + cloud access security - Read more

Smart Cloud Security

Learn More DG and Netskope for enterprise DLP + cloud access security 1 - Read more

Subscribe to Data Insider

Subscribe to <span style="color: #11111; font-style: bold; letter-spacing: -1px;">DATA</span><span style="color: #E51892; font-style: italic; font-style: bold; letter-spacing: -1px;">INSIDER</span> .blog_subscribe_block{ margin-top: 50px !important; margin-left: auto;...

RSA 2018

RSA 2018 Digital Guardian will be exhibiting at RSA 2018. Discover all the things happening at our booth and beyond! ...

Latest article

Stealthy CastleLoader Malware Attacking US Government Agencies and Critical Infrastructure

A sophisticated malware loader known as CastleLoader has emerged as a critical threat to US government agencies and critical infrastructure organizations. First identified in...

This WhatsApp Link Can Hand Over Your Account in Seconds

A sophisticated phishing campaign impersonating WhatsApp Web uses fake meeting links and QR codes to hijack accounts and enable real-time surveillance. The post This WhatsApp...

Output from vibe coding tools prone to critical security flaws, study finds

Popular vibe coding platforms consistently generate insecure code in response to common programming prompts, including creating vulnerabilities rated as ‘critical,’...

Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft

RedVDS cyber-crime-as-a-service platform powering phishing, BEC attacks and other fraud has cost victims millions - Read more