
BlackFog Webinar
Reports at the beginning of 2023 suggested that ransomware was declining, given the decreased number of attacks against organizations recorded during 2022. But is this true or can this be attributed to other factors? Is ransomware really on the decline?
Although the overall volume of attacks may have fallen, the number of reported attacks actually grew by 29% . Ransomware remains as one of the most prominent cyberthreats faced by organizations globally, and this threat cannot be taken lightly. Organizations must implement the right tools for prevention and recovery from these attacks.
In this webinar Dr Darren Williams, Founder and CEO of BlackFog, is joined by Michael Sampson, Senior Analyst at Osterman Research to discuss the current state of ransomware and changes in the cybersecurity landscape, they’ll also delve into some recent research into strategies for prevention and recovery.
Share This Story, Choose Your Platform!
Related Posts
RAG Poisoning: How Hidden Prompts Steal Corporate Data
RAG poisoning lets attackers hijack AI assistants like Copilot to exfiltrate corporate data. Here is how the attack works and how to defend against it.
What Are Attack Surface Reduction Rules And How Should Firms Implement Them?
What are attack surface reduction rules? Learn what this process involves and how it can be used to block common cyberattack behavior.
How To Measure A Reduction In Attack Surface Over Time
What must firms keep in mind in order to ensure they're seeing progress in their attack surface reduction efforts?
What Is Attack Surface Management In Cybersecurity?
Learn what attack surface management in cybersecurity is, how it works and why it's essential for identifying and reducing security risks.
How Privilege Management Reduces Attack Surfaces
Discover how privilege management reduces attack surfaces by limiting access, enforcing least privilege and preventing unauthorised system access.
How Exposure Management Platforms Reduce Attack Surface
Learn how exposure management platforms reduce attack surface through continuous visibility, risk prioritisation and proactive security.






