Data Privacy and Cybersecurity Blog
The State of Ransomware in 2021
Following on from our State of Ransomware 2020 blog, we’ll be tracking the 2021 publicized ransomware attacks each month to share with you via this blog. This year we expect the number of attacks to increase and newer forms to become more sophisticated and disruptive.
Bracing for the Inevitable: 5 Security Predictions for 2022
From continued ramifications of the pandemic and the increasing sophistication and frequency in cyber attacks, the past year was truly one for the record books. We look at the 5 most likely security predictions for 2022.
Introducing ADX Webinar – The New Standard in Cybersecurity Protection
Data exfiltration is a significant threat to organizations and is implicated in many types of cybersecurity incidents. For example, ransomware gangs use both encryption that causes operational disruption for the victim and the threat [...]
Top 5 Cyberattacks of 2021
2021 is already a record-breaking year for the cybercrime industry. We discuss the top 5 cyberattacks of 2021 and how they might have been prevented.
Anti Data Exfiltration (ADX) Versus Data Loss Prevention (DLP)
Organizations have spent years developing and implementing different solutions for keeping sensitive data secure. While the Data Loss Prevention (DLP) model has been one of the most popular approaches for addressing these security pain points, Anti Data Exfiltration (ADX) provides a new solution to this problem.
Anonymous Ransomware Attack Tools
Over the last few years, leaked data from some of the most devastating cyberattacks has found its way onto the Dark Web, a trend that seems to be increasing with the [...]
Zero Trust Architecture and Data Exfiltration: What this means for you
Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an important part of this new mandate.
The Shift from Ransomware to Data Theft Extortion
With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.
Top 5 Ransomware Myths
In this blog we’ll look at some of the ransomware myths and how data exfiltration prevention can facilitate compliance and mitigate risks associated with an attack.