
ADX Webinar
Data exfiltration is a significant threat to organizations and is implicated in many types of cybersecurity incidents. For example, ransomware gangs use both encryption that causes operational disruption for the victim and the threat of exposing exfiltrated data if the ransom demand is not paid. Preventing data exfiltration remains a weakness for many organizations, despite having a complex set of cybersecurity tools already, including data loss prevention (DLP) solutions. A new approach is needed to stop the threat and consequential damage of data exfiltration.
In this webinar Dr Darren Williams, Founder and CEO of BlackFog is joined by Michael Sampson, Senior Analyst at Osterman Research to discuss a recent survey on data exfiltration and to introduce the category of Anti Data Exfiltration (ADX) cybersecurity solutions.
Learn more about ADX and how it provides a new approach in the ongoing fight against cyberattacks.
Related Posts
The State of Ransomware 2025
BlackFog's state of ransomware report 2025 measures publicly disclosed and non-disclosed attacks globally.
Iran Hacked Trump Campaign: A Deep Dive into the Cyberattack
An overview of how Iranian IRGC hackers penetrated Trump's campaign through spear-phishing, leaked sensitive data to influence opponents, and the DOJ's subsequent response.
Microsegmentation: Strengthening Network Security Against Zero Day Exploits
Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.
Patch Management: An Essential Part of Data Security
Ensuring you have a strong patch management strategy in place is essential in minimizing the risks posed by known vulnerabilities.
Layered Security – How a Defense-in-Depth Approach Guards Against Unknown Threats
Make sure your systems are fully protected from threats at every level by incorporating these six key layered security defense strategies.
Zero Trust Data Protection: Securing Your Data in a Perimeterless World
What should firms know about zero trust data protection and how can they ensure it is implemented effectively?