Black Hat 2018

<img src="/sites/default/files/Blackhat-logo.png"> Join Digital Guardian at Black Hat 2018! - Read more

DG CUE 2018

DG CUE - Read more

Analyst Insights – Building An Efficient Data Security Program with Forrester

Analyst Insights – Building An Efficient Data Security Program This webinar was recorded on May 17, 2018. - Read more

Gartner Security & Risk Management Summit 2018

Gartner Security & Risk Management Summit 2018 June 4th – 7th | National Harbor, MD - Read more

FS-ISAC 2018 Summit

<img src="https://info.digitalguardian.com/rs/768-OQW-145/images/fsi-isac-logo.png"> Digital Guardian will be presenting and exhibiting in Booth #69.Get tools, tips and recipes from our threat hunting experts. Boca Raton |...

Analyst Insights – The 4 Questions for GDPR Success

Bloor Research Analyst Insights – The 4 Questions for GDPR Success This webinar was recorded April 26, 2018. - Read more

Netskope

<img src="/sites/default/files/NET_horizontal_fullcolor.png"> DG and Netskope for enterprise DLP + cloud access security - Read more

Smart Cloud Security

Learn More DG and Netskope for enterprise DLP + cloud access security 1 - Read more

Subscribe to Data Insider

Subscribe to <span style="color: #11111; font-style: bold; letter-spacing: -1px;">DATA</span><span style="color: #E51892; font-style: italic; font-style: bold; letter-spacing: -1px;">INSIDER</span> .blog_subscribe_block{ margin-top: 50px !important; margin-left: auto;...

RSA 2018

RSA 2018 Digital Guardian will be exhibiting at RSA 2018. Discover all the things happening at our booth and beyond! ...

Latest article

Building an AI-powered defense-in-depth security architecture for serverless microservices

Enterprise customers face an unprecedented security landscape where sophisticated cyber threats use artificial intelligence to identify vulnerabilities, automate attacks, and evade detection...

Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more. The post...

16th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch telecom provider...

Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords

Security researchers have challenged end-to-end encryption claims from popular commercial password managers - Read more