• Why Endpoint protection is vital

    June 15 2022

    Why Endpoint Protection is a Vital Part of Any Anti-Data Exfiltration Strategy

    On-device protection for businesses' growing digital footprint is essential in protecting firms from data exfiltration - find out why this is a growing priority.

  • Where's your stolen data going?

    June 15 2022

    Data Exfiltration – Do You Know Where Your Stolen Data is Going?

    Understanding who's trying to steal your data and what they plan to do with it is essential in helping to protect your business from data exfiltration.

  • Data Exfiltration 101

    March 27 2022

    Data Exfiltration 101: How Threat Actors Compromise Networks

    Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.

  • Anti Data Exfiltration versus Endpoint Security

    January 17 2022

    Anti Data Exfiltration versus Endpoint Security

    Where traditional Endpoint Security relies on sensitive data matching algorithms, Anti Data Exfiltration uses a more sophisticated approach and monitors outbound traffic on endpoints, and restricts data from leaving the network.

  • BlackFog ARM 64 Edition

    September 22 2021

    BlackFog ARM 64 edition provides anti data exfiltration across new platforms

    BlackFog ARM 64 edition for now available for Windows 10 and 11 computers such as Microsoft’s Surface Pro X and virtual machines.

  • Anti Data Exfiltration ADX

    September 14 2021

    Anti Data Exfiltration (ADX) Versus Data Loss Prevention (DLP)

    Organizations have spent years developing and implementing different solutions for keeping sensitive data secure. While the Data Loss Prevention (DLP) model has been one of the most popular approaches for addressing these security pain points, Anti Data Exfiltration (ADX) provides a new solution to this problem.

  • Zero Trust Architecture and Data Exfiltration

    June 7 2021

    Zero Trust Architecture and Data Exfiltration: What this means for you

    Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an important part of this new mandate.

  • Data Theft Extortion

    May 18 2021

    The Shift from Ransomware to Data Theft Extortion

    With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.

  • When Firewalls Fail

    April 19 2021

    When Firewalls Fail: How to Prevent Cyberattacks in 2021

    Cybercriminals continue to find ways around web application firewalls, but there are better options for preventing attacks such as data exfiltration prevention.

  • Data Exfiltration Strategy

    February 23 2021

    What’s Your Data Exfiltration Strategy?

    What’s your data exfiltration strategy? If you don’t have one, the good news is you're not alone. When it comes to preventing cyberattacks many organizations are still focused on protecting the perimeter to keep the bad actors out.