Data Exfiltration

Why Endpoint Protection is a Vital Part of Any Anti-Data Exfiltration Strategy

On-device protection for businesses' growing digital footprint is essential in protecting firms from data exfiltration - find out why this is a growing priority.

2022-06-27T12:13:55+00:00June 15th, 2022|Data Exfiltration|

BlackFog ARM 64 edition provides anti data exfiltration across new platforms

BlackFog ARM 64 edition for now available for Windows 10 and 11 computers such as Microsoft’s Surface Pro X and virtual machines.

2022-08-05T18:57:33+00:00September 22nd, 2021|Data Exfiltration, Press Release|

Anti Data Exfiltration (ADX) Versus Data Loss Prevention (DLP)

Organizations have spent years developing and implementing different solutions for keeping sensitive data secure. While the Data Loss Prevention (DLP) model has been one of the most popular approaches for addressing these security pain points, Anti Data Exfiltration (ADX) provides a new solution to this problem.

2021-09-15T01:34:02+00:00September 14th, 2021|Data Exfiltration|

Zero Trust Architecture and Data Exfiltration: What this means for you

Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an important part of this new mandate.

2021-06-07T21:53:04+00:00June 7th, 2021|Data Exfiltration|

The Shift from Ransomware to Data Theft Extortion

With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.

2021-07-21T16:20:58+00:00May 18th, 2021|Data Exfiltration, Ransomware|