Ransomware and Cybersecurity Blog
Anti Data Exfiltration (ADX) Versus Data Loss Prevention (DLP)
Organizations have spent years developing and implementing different solutions for keeping sensitive data secure. While the Data Loss Prevention (DLP) model has been one of the most popular approaches for addressing these security pain points, Anti Data Exfiltration (ADX) provides a new solution to this problem.
Anonymous Ransomware Attack Tools
Over the last few years, leaked data from some of the most devastating cyberattacks has found its way onto the Dark Web, a trend that seems to be increasing with the [...]
Zero Trust Architecture and Data Exfiltration: What this means for you
Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an important part of this new mandate.
The Shift from Ransomware to Data Theft Extortion
With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.
Top 5 Ransomware Myths
In this blog we’ll look at some of the ransomware myths and how data exfiltration prevention can facilitate compliance and mitigate risks associated with an attack.
The Rise and Fall of VPNs
Despite often being considered a ‘dinosaur’ technology, the Coronavirus pandemic gave Virtual private network software or (VPNs) a new lease of life as IT teams scrambled to protect their newly remote employees.
When Firewalls Fail: How to Prevent Cyberattacks in 2021
Cybercriminals continue to find ways around web application firewalls, but there are better options for preventing attacks such as data exfiltration prevention.
A New Look at Cryptojacking: An Underreported Security Threat
With a significant increase in value of cryptocurrencies over the past year, 2021 is on pace to exceed 2018 as the “year of cryptojacking”. Cryptojacking experts are seeing steady upward momentum every year, along with new threats and risks.
What’s Your Data Exfiltration Strategy?
What’s your data exfiltration strategy? If you don’t have one, the good news is you're not alone. When it comes to preventing cyberattacks many organizations are still focused on protecting the perimeter to keep the bad actors out.