BlackFog Logo

brenda_robb

About Brenda Robb

Brenda has extensive experience in global marketing operations in high tech companies building product marketing strategies and go-to-market programs at scale. Brenda leads the global marketing strategy and direction at BlackFog and oversees public relations, social media, go-to-market programs and deliverables.

LLM Cybersecurity: How Businesses Can Protect and Leverage AI Safely

Learn about some of the key LLM cybersecurity issues that need to be considered when adding tools like generative AI to firms' systems.

2025-08-29T13:56:12+01:00July 30th, 2025|AI, Cybersecurity, Network Protection, Privacy|

How Can a Zero-Trust Approach Help Guard Against LLM prompt injection attacks?

Adapting zero-trust network security principles for use with AI is one way in which businesses can defend models from LLM prompt injection attacks.

2025-08-29T14:01:25+01:00July 30th, 2025|AI, Cybersecurity, Network Protection, Privacy|

Scattered Spider’s Expanding Web of Ransomware Attacks

Scattered Spider is responsible for a series of cyberattacks in 2024-2025, primarily targeting retailers, insurance companies, and airlines via social engineering, identity theft, and ransomware.

2025-07-24T03:23:34+01:00July 21st, 2025|Breach, Cybersecurity, Ransomware, Variants|

Fog Ransomware Surges in 2025 Hitting Schools and Banks Alike

Fog ransomware has surged in 2025, targeting the educational and financial sector. Learn about its technical tactics, double extortion methods, and defense strategies.

2025-07-24T03:44:56+01:00July 14th, 2025|Breach, Cybersecurity, Ransomware, Variants|

Data Risk Assessment: The First Step Toward Smarter Data Protection

Understanding how to conduct a data risk assessment is a key step in protecting systems and networks from both internal and external threats.

2025-08-11T15:32:59+01:00July 11th, 2025|Cybersecurity, Network Protection, Privacy|

Data Classification: A Practical Guide to Protecting What Matters Most

Data classification is an essential part of any successful cybersecurity strategy. Find out what you need to know to conduct this effectively.

2025-08-11T15:41:52+01:00July 11th, 2025|Cybersecurity, Network Protection, Privacy|