Syndicated Blog - Security Boulevard

Syndicated Blog

BlackFog
Data Exfiltration and Ransomware Prevention

Ahlborn Structural Steel Fights Ransomware with BlackFog’s ADX Technology

| | case-study
Ahlborn Structural Steel Fights Ransomware with BlackFog’s ADX Technology ...

Top 5 Cyberattacks of 2021

| | Cybersecurity
2021 is already a record-breaking year for the cybercrime industry. We discuss the top 5 cyberattacks of 2021 and how they might have been prevented ...

BlackFog ARM 64 edition provides anti data exfiltration across new platforms

BlackFog ARM 64 edition for now available for Windows 10 and 11 computers such as Microsoft’s Surface Pro X and virtual machines ...

Robert E. Harris Insurance Prevents Data Exfiltration with BlackFog

| | case-study
Robert E. Harris Insurance transformed their organization by using BlackFog to prevent data exfiltration on every device to minimize the risk of ransomware ...

Anti Data Exfiltration (ADX) Versus Data Loss Prevention (DLP)

| | data exfiltration
Organizations have spent years developing and implementing different solutions for keeping sensitive data secure. While the Data Loss Prevention (DLP) model has been one of the most popular approaches for addressing these ...
News 2020

News 2020

| | SBN News
BlackFog News 2020 ...

Girl Scouts Safeguards Data with BlackFog

| | case-study
Girl Scouts North Carolina Coastal Pines serves 35,000+ girls and volunteers in 41 counties in central and eastern North Carolina, During the evaluation phase they quickly discovered that BlackFog was filling a ...
The Deep Web

Anonymous Ransomware Attack Tools

| | Ransomware
Over the last few years, leaked data from some of the most devastating cyberattacks has found its way onto the Dark Web, a trend that seems to be increasing with the notable ...
Zero Trust and Data Exfiltration

Zero Trust Architecture and Data Exfiltration: What this means for you

Cyberattacks like the Colonial Pipeline attack have become disturbingly frequent. The US Federal government is now mandating a Zero trust architecture across all departments. We look at how data exfiltration is an ...
Data Extortion

The Shift from Ransomware to Data Theft Extortion

With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is ...

Techstrong Group