fbpx

Zero Trust Architecture and Data Exfiltration: What this means for you

Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an important part of this new mandate.

2021-06-07T21:53:04-07:00June 7th, 2021|Data Exfiltration|

The Shift from Ransomware to Data Theft Extortion

With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.

2021-07-21T16:20:58-07:00May 18th, 2021|Data Exfiltration, Ransomware|

Ransomware Breaches and Class Action Lawsuits

While some organizations are waking up to the fact the ransomware attacks are in fact data breaches, unless perhaps data exfiltration technology can prove otherwise, many are still opting to sweep the attack under the carpet.

2021-05-06T03:46:55-07:00February 15th, 2021|Cybersecurity, Data Exfiltration, Ransomware|

Data Exfiltration Prevention and the Top 10 Cyberattacks of 2020

Looking back at the cyberattacks of 2020, selecting what we see as the top 10 was no easy task. Attacks were frequent, particularly when it came to ransomware, which rose seven-fold last year. We discuss how data exfiltration prevention could have stopped the top 10 cyberattacks of 2020.

2021-07-14T07:18:38-07:00January 20th, 2021|Data Exfiltration, Cybersecurity|