February 15 2021
Ransomware Breaches and Class Action Lawsuits
While some organizations are waking up to the fact the ransomware attacks are in fact data breaches, unless perhaps data exfiltration technology can prove otherwise, many are still opting to sweep the attack under the carpet.
December 4 2020
Insider Threats: Mitigating the Risks of Data Exfiltration
In addition to the dramatic rise in ransomware during 2020, many organizations face an even more imminent danger, the insider threat. Leading analyst firm Forrester expects insiders to be responsible for a third of breaches in 2021, up 8% from 2020, mostly due to the increase in remote working.
October 13 2020
Mitigating Ransomware and Cyber Risk in the Hybrid Workforce
If 2020 has taught IT security leaders anything, it’s that remote workers are more vulnerable to cyberattacks and ransomware, and the tools that they thought would protect them outside the walls of the corporate environment simply didn’t in many cases.
October 5 2020
All Cyberattacks Lead to Data Exfiltration
The threat of data loss, data breaches and ransomware is on the minds of everyone. We discuss the crucial part that data exfiltration plays in defending an organization from these modern threats.
August 4 2020
Ransomware Reputation is Everything
Ransomware attacks have significantly more consequences than the cost of remediation, assessment and regulatory reporting.
November 27 2019
Ransomware Cyberattacks in Healthcare
Cybercriminals are increasingly targeting healthcare organizations. As cybercriminals continue to outpace the security technology and processes in the healthcare sector, what can IT leaders do to prevent modern-day cyberattacks?
February 20 2018
Fileless PowerShell Attacks
Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.
October 16 2017
BlackFog Enterprise released with Dark Web protection
Unlike antivirus software which uses signature based techniques, BlackFog Enterprise uses next generation multivariant behavioral analysis to prevent attacks and reduce the total surface area exposed to cyber criminals. This includes blocks based on geography, DNS and network anomalies.