Displaying items by tag: exfiltration activity

GUEST OPINION by Joe Slowik, Gigamon Principal Security Engineer, Applied Threat Research: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly in recent years. Historically, adversaries linked to state sponsors or similar activities would engage in data theft to further goals of industrial espionage or intellectual property theft.

Published in Guest Opinion

GUEST OPINION by Joe Slowik, Gigamon: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly over the past few years.

Published in Guest Opinion

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments