Anti Data Exfiltration versus Endpoint Security
Where traditional Endpoint Security relies on sensitive data matching algorithms, Anti Data Exfiltration uses a more sophisticated approach and monitors outbound traffic on endpoints, and restricts data from leaving the network.
2021 Ransomware Attack Report
In 2020 and 2021 BlackFog measured publicly disclosed attacks globally. The 2021 ransomware attack report summarizes these findings and highlights the key trends as we enter 2022.
The State of Ransomware in 2021
Following on from our State of Ransomware 2020 blog, we’ll be tracking the 2021 publicized ransomware attacks each month to share with you via this blog. This year we expect the number of attacks to increase and newer forms to become more sophisticated and disruptive.
Bracing for the Inevitable: 5 Security Predictions for 2022
From continued ramifications of the pandemic and the increasing sophistication and frequency in cyber attacks, the past year was truly one for the record books. We look at the 5 most likely security predictions for 2022.
Top 5 Cyberattacks of 2021
2021 is already a record-breaking year for the cybercrime industry. We discuss the top 5 cyberattacks of 2021 and how they might have been prevented.
Anti Data Exfiltration (ADX) Versus Data Loss Prevention (DLP)
Organizations have spent years developing and implementing different solutions for keeping sensitive data secure. While the Data Loss Prevention (DLP) model has been one of the most popular approaches for addressing these security pain points, Anti Data Exfiltration (ADX) provides a new solution to this problem.
Anonymous Ransomware Attack Tools
Over the last few years, leaked data from some of the most devastating cyberattacks has found its way onto the Dark Web, a trend that seems to be increasing with the [...]
Zero Trust Architecture and Data Exfiltration: What this means for you
Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an important part of this new mandate.
The Shift from Ransomware to Data Theft Extortion
With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.