Grand Theft Data- Data Exfiltration Study: Actors, Tactics, and Detection

Grand Theft Data- Data Exfiltration Study: Actors, Tactics, and Detection

This in-depth report provides a detailed look at a recent survey exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.

Download this white paper to explore

  • Who is most responsible for the serious data breach incidents;
  • The type of data that is most commonly taken;
  • The method that is most commonly employed to take the data.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.