Data Security

Who Let the Data Out? Who, Who, Who, Who? (Part 3 of 3)

It feels like the last song of the concert—this is the final blog in our cybersecurity benchmark series! As every good detective starts with information, we’ve been digging into the classic six “w” questions: who, what, when, where, why, and how. To find those answers for security professionals, data was ...

Enterprise

Data Exfiltration: Stop Breaches Before They Happen w/ Data Protection

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Now, we’ve arrived at the moment you’ve all been waiting for—the seventh and final blog post in our series. You’ve already absorbed a great deal many facts, figures, and truths about the who, what, where, why, and ...

Enterprise

Data Exfiltration, Part 5: What Tactics Are Thieves Using?

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. As you found out from our previous blog, a great deal of data goes out the door through both physical and electronic means. In this blog, we’ll address some of the more sophisticated electronic data exfiltration techniques ...

Enterprise

Data Exfiltration, Part 4: How Does the Data Leave Your Four Walls?

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. We hope that you’re stoked about expanding your knowledge about data exfiltration. In blog 4, we’re serving up another meaty topic—we’ll be looking at how exactly data walks out the door. Cybercriminals are exploiting the rapidly growing ...

Enterprise

Data Exfiltration, Part 3: What Do Data Thieves Want?

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Welcome to part 3 of our discussion on data exfiltration. Sit down and make yourself comfortable as we get inside the mind of data thieves and explore the types and formats of data that interest them most. ...

Enterprise

Data Exfiltration, Part 2: Who’s After Your Data?

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Welcome to the second episode of our data exfiltration blog series. We’ll be taking a close look at the innocent and not-so-innocent actors who compromise your valuable corporate assets (no, we’re not talking about the Hollywood variety!). ...

Enterprise

Data Exfiltration: The Who, What, Why, Where, and How

This blog was written by David Bull, McAfee’s former Director, Enterprise Solution Marketing. Call it what you will—data loss, data leakage, or data breach—theft of valuable corporate information assets has indisputably become a pervasive global problem. Many security professionals in every sector have had the misfortune of experiencing at least ...

Executive Perspectives

How Is Your Data Getting Out?

It’s 11:00 p.m. Do you know where your data is? Most reports on data theft events concentrate on how the bad guys got into the organization, what failed to stop them, and what information was taken. I often think about how the information was taken out, or exfiltrated, and who ...

Subscribe to McAfee Securing Tomorrow Blogs