GUEST OPINION by Joe Slowik, Gigamon: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly over the past few years.