
ADX Webinar
Data exfiltration is a significant threat to organizations and is implicated in many types of cybersecurity incidents. For example, ransomware gangs use both encryption that causes operational disruption for the victim and the threat of exposing exfiltrated data if the ransom demand is not paid. Preventing data exfiltration remains a weakness for many organizations, despite having a complex set of cybersecurity tools already, including data loss prevention (DLP) solutions. A new approach is needed to stop the threat and consequential damage of data exfiltration.
In this webinar Dr Darren Williams, Founder and CEO of BlackFog is joined by Michael Sampson, Senior Analyst at Osterman Research to discuss a recent survey on data exfiltration and to introduce the category of Anti Data Exfiltration (ADX) cybersecurity solutions.
Learn more about ADX and how it provides a new approach in the ongoing fight against cyberattacks.
Share This Story, Choose Your Platform!
Related Posts
BlackFog ADX Instinct: Your Virtual CISO
ADX Instinct, our expert-led virtual CISO service provides strategic guidance, risk management and tailored compliance support.
BlackFog Report Reveals 36% Increase in Q3 Ransomware Attacks YoY
BlackFog report reveals 36% YoY increase in Q3 ransomware attacks 2025, with healthcare, government and technology among the hardest hit.
2025 Q3 Ransomware Report
BlackFog’s 2025 Q3 Ransomware Report - global cyber battlefield heats up as ransomware groups escalate attacks. Download full report for key insights.
How To Prevent Phishing: Essential Strategies for Businesses
Find out everything you need to know about how to prevent phishing attacks from impacting your business in our comprehensive guide.
Spear Phishing Explained: How To Recognize And Prevent Targeted Cyberattacks
Targeted spear phishing attacks remain a threat to every business. Make sure your employees know how to spot them and what to do to minimize the risk.
What Is Clone Phishing? How To Detect And Prevent This Overlooked Cyberthreat
Clone phishing is a subtle but dangerous attack that's easy to miss. Learn how it works, how it differs from other threats and what to do if someone falls victim.





