• Intellectual property breaches

    January 17 2023

    Intellectual Property Breaches: A New Target for Cybercriminals

    Ransomware has forced business leaders to reevaluate the data they collect and process, it has also changed the dynamics of confidential data and intellectual property breaches in general. All data has value, but some types are simply worth more than others.

  • MSP's Attack Target

    October 18 2022

    MSP’s the new attack target

    Cybercrime groups are beginning to specifically target managed service providers (Msp's) in order to gain access to their clients and users.

  • Can Your Business Detect Data Exfiltration?

    September 6 2022

    Detecting Data Exfiltration – Why You Need the Right Tools

    Why is having the right tools for data exfiltration prevention so important?

  • August 5 2022

    The History and Evolution of Ransomware

    What lessons should businesses be taking from these five major ransomware attacks and variants of recent years?

  • Preventing Data Exfiltration

    June 15 2022

    Preventing Insider Threats: What Does it Take to Guard Against Data Exfiltration?

    The cost of insider threats to businesses is on the rise, so how can you prevent data being compromised by these actions?

  • Why Endpoint protection is vital

    June 15 2022

    Why Endpoint Protection is a Vital Part of Any Anti-Data Exfiltration Strategy

    On-device protection for businesses' growing digital footprint is essential in protecting firms from data exfiltration - find out why this is a growing priority.

  • Where's your stolen data going?

    June 15 2022

    Data Exfiltration – Do You Know Where Your Stolen Data is Going?

    Understanding who's trying to steal your data and what they plan to do with it is essential in helping to protect your business from data exfiltration.

  • Data Exfiltration 101

    March 27 2022

    Data Exfiltration 101: How Threat Actors Compromise Networks

    Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.

  • Anti Data Exfiltration versus Endpoint Security

    January 17 2022

    Anti Data Exfiltration versus Endpoint Security

    Where traditional Endpoint Security relies on sensitive data matching algorithms, Anti Data Exfiltration uses a more sophisticated approach and monitors outbound traffic on endpoints, and restricts data from leaving the network.

  • BlackFog ARM 64 Edition

    September 22 2021

    BlackFog ARM 64 edition provides anti data exfiltration across new platforms

    BlackFog ARM 64 edition for now available for Windows 10 and 11 computers such as Microsoft’s Surface Pro X and virtual machines.