Digital Guardian (@digitalguardian) 's Twitter Profile
Digital Guardian

@digitalguardian

Provider of data protection solutions and services that have secured businesses around the world since 2003. A key part of @FortraOfficial.

ID: 540998751

linkhttp://digitalguardian.com calendar_today30-03-2012 15:38:01

12,12K Tweet

16,16K Followers

12,12K Following

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Australia recently passed two pieces of legislation designed to bolster security and privacy by protecting personal data in the country. Catch up on the news in this new Fortra Data Classification blog: dataclassification.fortra.com/blog/australia…

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

What are the key components of an effective incident response plan? Preparation and having an incident response plan are only part of it. Learn more: hubs.la/Q030fzJR0

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Cybersecurity measures in the NDAA, a major supply-chain attack on security experts, and new federal cloud security mandates were among this past week’s top stories. Catch up with @[email protected] -- Follow me there David DiMolfetta @mattbracken EM + @carlypage_: digitalguardian.com/blog/friday-fi…

Cybersecurity measures in the NDAA, a major supply-chain attack on security experts, and new federal cloud security mandates were among this past week’s top stories. Catch up with <a href="/dangoodin001/">@dangoodin@infosec.exchange -- Follow me there</a> <a href="/ddimolfetta/">David DiMolfetta</a> @mattbracken <a href="/lizoleeta/">EM</a> + @carlypage_: digitalguardian.com/blog/friday-fi…
Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Data mining risks refer to the potential pitfalls and negative consequences associated with the data mining process. Learn more about data mining risks and how to protect yourself from them in this blog: digitalguardian.com/blog/what-are-…

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Today, companies need to demonstrate that they're making a “best effort” to manage the data they oversee; Digital Guardian's SSE solution provides the information needed to manage data loss risk. digitalguardian.com/blog/we-didnt-…

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Audit logs and audit trails document a complete historical record of system actions and activities. They serve as a security measure to monitor and verify system activities, ensure compliance, and aid in troubleshooting and forensic investigations. digitalguardian.com/blog/what-audi…

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

To support compliance requirements and legal exposure, organizations must understand the privacy, legal, and data compliance implications of storing data. buff.ly/4acH4p6

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Working with CUI? Standards have and will change, so you need a tool that's flexible to meet those changes with the click of a mouse vs. waiting on vendors to make changes to address the new standards. Learn how Fortra can help: dataclassification.fortra.com/compliance/cmmc

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

In the UK, the GSC - or Government Security Classifications - utilizes three classification tiers: OFFICIAL, SECRET, and TOP SECRET, each representing a different level of sensitivity. Learn more about the system in this blog: hubs.la/Q0314GCD0

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

The Defense Industrial Base (DIB) is vast. It comprises more than 100,000 companies and subcontractors that work under contract with the Department of Defense (DoD). How can these organizations go about securing sensitive defense information? hubs.la/Q031hLx_0

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

"In 2025, new global regulations like the EU AI Act, GDPR updates, Malaysia’s privacy laws, and U.S. state privacy laws are reshaping compliance..." Good to see our Wade Barisoff in Byron Acohido's Last Watchdog: hubs.la/Q031s14y0

"In 2025, new global regulations like the EU AI Act, GDPR updates, Malaysia’s privacy laws, and U.S. state privacy laws are reshaping compliance..." Good to see our Wade Barisoff in <a href="/byronacohido/">Byron Acohido</a>'s Last Watchdog: hubs.la/Q031s14y0
Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Data tokenization is a security method for replacing sensitive data with non-sensitive, unique tokens. Learn about how it works, why it's important for data security, and some of the challenges of data tokenization in this new blog. hubs.la/Q031srxV0

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

ISO 27001 is an international standard for information security management. Learn the ins and outs of ISO 27001, including the benefits of certification and implementation, how it helps secure data, and how to maintain compliance in this blog: digitalguardian.com/blog/what-iso-…

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

CMMC 2.0 will require an estimated 76,000 organizations to maintain a level 2 or 3 certification to bid on and hold DoD contracts. Need some help? Join this IT Brew ☕️ webinar for all the need-to-know points on CUI and CMMC compliance: itbrew.com/events/countdo…

CMMC 2.0 will require an estimated 76,000 organizations to maintain a level 2 or 3 certification to bid on and hold DoD contracts. Need some help? Join this <a href="/ITBrew/">IT Brew ☕️</a> webinar for all the need-to-know points on CUI and CMMC compliance: itbrew.com/events/countdo…
Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Social security numbers, credit cards, email addresses, phone numbers. When it comes to data, what's the difference between sensitive and personal data? hubs.la/Q0322nrF0

Digital Guardian (@digitalguardian) 's Twitter Profile Photo

Not every organization can afford to engage in a data arms race to remain competitive in the data-hungry era of generative AI. Embracing data classification best practices is a cost-effective way to get the desired outcomes from your data. dataclassification.fortra.com/blog/data-clas…

Not every organization can afford to engage in a data arms race to remain competitive in the data-hungry era of generative AI. Embracing data classification best practices is a cost-effective way to get the desired outcomes from your data. dataclassification.fortra.com/blog/data-clas…
Digital Guardian (@digitalguardian) 's Twitter Profile Photo

A new integration of our Secure Service Edge (SSE) solution into our Analytics & Reporting Cloud (ARC) delivers a holistic approach to data protection, combining DLP, CASB, SWG, and ZTNA: hubs.la/Q0321Vn40

A new integration of our Secure Service Edge (SSE) solution into our Analytics &amp; Reporting Cloud (ARC) delivers a holistic approach to data protection, combining DLP, CASB, SWG, and ZTNA: hubs.la/Q0321Vn40