Agent Visibility Updates for AXIOM Cyber

Organizations often have multiple examiners assigned to individual investigations. Previously with AXIOM Cyber’s ad hoc agent deployment, one examiner could not connect to an agent already deployed to an endpoint under investigation, if they did not originally create the agent. With the latest update, AXIOM Cyber no longer restricts agent visibility to the unique user … Continued

Anatomy of a Data Exfiltration Investigation

In the United States, 62% of Insider Threats are data exfiltration. This is, by far, the most common type of Insider Threat, with three times more frequency than the second most common Insider Threat: privileged misuse.  Data exfiltration or IP theft, is simply when data walks out the door of your business. These types of … Continued