Agent Visibility Updates for AXIOM Cyber

Organizations often have multiple examiners assigned to individual investigations. Previously with AXIOM Cyber’s ad hoc agent deployment, one examiner could not connect to an agent already deployed to an endpoint under investigation, if they did not originally create the agent. With the latest update, AXIOM Cyber no longer restricts agent visibility to the unique user … Continued

Anatomy of a Data Exfiltration Investigation

In the United States, 62% of Insider Threats are data exfiltration. This is, by far, the most common type of Insider Threat, with three times more frequency than the second most common Insider Threat: privileged misuse.  Data exfiltration or IP theft, is simply when data walks out the door of your business. These types of … Continued

Anatomy of a Business Email Compromise Investigation

While ransomware and phishing attacks seem to dominate cybersecurity headlines and mindshare, there is another threat, one that is arguably stealthier and more dangerous: business email compromise (BEC) or also sometimes called CEO fraud. A business email compromise attack uses the principles of social engineering where a threat actor will send a well-crafted email that’s tailored to an individual or a … Continued