ADX Webinar
Data exfiltration is a significant threat to organizations and is implicated in many types of cybersecurity incidents. For example, ransomware gangs use both encryption that causes operational disruption for the victim and the threat of exposing exfiltrated data if the ransom demand is not paid. Preventing data exfiltration remains a weakness for many organizations, despite having a complex set of cybersecurity tools already, including data loss prevention (DLP) solutions. A new approach is needed to stop the threat and consequential damage of data exfiltration.
In this webinar Dr Darren Williams, Founder and CEO of BlackFog is joined by Michael Sampson, Senior Analyst at Osterman Research to discuss a recent survey on data exfiltration and to introduce the category of Anti Data Exfiltration (ADX) cybersecurity solutions.
Learn more about ADX and how it provides a new approach in the ongoing fight against cyberattacks.
Related Posts
The State of Ransomware 2024
BlackFog's state of ransomware report measures publicly disclosed and non-disclosed attacks globally.
Top 5 MSP Cyberattacks in 2023/2024
In 2023 and 2024, several high-profile cyberattacks targeted managed service providers (MSPs), disrupting services for their clients. Learn about the top 5 MSP attacks during this period, including incidents at CTS, Tietoevry, Lumen Technologies, HTC Global Services, and Südwestfalen IT.
Data Privacy vs Data Security: Why you Need to Know the Difference
Are you aware of the differences between data privacy vs data security that may impact how you develop a comprehensive protection strategy
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.
Healthcare Industry Targeted by Cybercrime
Why is the healthcare industry targeted so frequently? In 2023, there were 136 publicized attacks, a 134% increase from the year before.
What Should a Company do After a Data Breach? Key Steps you Need to Know About
Does your firm know what to do in the immediate aftermath of discovering a data breach?