Guardian Digital Blog - Page No: 7

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

Most people are somewhat familiar with prevalent and dangerous email threats like phishing and malware; however, the methods utilized in these attack variations and the most effective way to combat these threats can be complex and confusing. Guardian Digital wants to educate businesses about common and costly email attacks, helping them navigate the complicated threat landscape with the latest information and the email security language they need to know to keep their users secure. 

Write comment (0 Comments)
A visual representation of cyber security

Brittany Day recently had a conversation with acclaimed cyber security expert Ira Winkler, author of  Advanced Persistent Security: A Cyberwarfare Approach. Mr. Winkler is a security researcher and a former NSA employee who writes about cyber security and enterprise digital threat protection. 

Write comment (0 Comments)
A visual representation of Open Source

In the tech giant’s largest deal ever and one of the biggest deals in US history, IBM closed its $34 billion acquisition of Red Hat on Tuesday July 9, 2019.

Write comment (0 Comments)

Pioneers of business email security for the past 20 years, Guardian Digital draws on the merits of Open Source coupled with expert engineering and unparalleled customer support. 

Write comment (0 Comments)
A visual representation of a threat-ready email security solution

In this interview Dave Wreski, CEO of Guardian Digital, explains various best practices for securing your email and protecting your privacy.

Write comment (0 Comments)
Person typing email on laptop

Is your solution doing enough to protect your users? This article helps you to decide.

Write comment (0 Comments)
A visual representation of a resilient business email security gateway

Resiliency is an important factor to consider when evaluating an email security solution, yet this characteristic often goes overlooked.

Write comment (0 Comments)

Blog Articles