Hi [[ session.user.profile.firstName ]]

Barkly Security Channel

  • Date
  • Rating
  • Views
  • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
    Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
    Jack Danahy, CTO, Barkly Recorded: Nov 28 2017 49 mins
    Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

    Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

    Register now to learn more on:

    - How ransomware is going fileless to get past protection
    - What makes everyone a target
    - Three protection strategies to minimize the risk to your organization


    Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.
  • Fileless Cyber Attacks Demystified
    Fileless Cyber Attacks Demystified
    Jack Danahy, CTO, Barkly Recorded: Oct 19 2017 39 mins
    From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped — or that they have to be difficult to understand.

    Join us to learn how attackers are using fileless techniques to gain execution, persistence, and lateral movement, and what you can do to keep your company protected.
  • 2017 Malware Trends - WannaCry, NotPetya, Emotet and more
    2017 Malware Trends - WannaCry, NotPetya, Emotet and more
    Jack Danahy, CTO, Barkly Recorded: Aug 29 2017 39 mins
    Ransomware and destructive malware attacks have had tremendous growth and impact in 2017, and it’s only August. Not only has there been a rise in the severity and frequency of attacks, but the level of sophistication, attack vectors and attack motives have also changed.

    Join this webinar to hear Jack Danahy, CTO, Barkly discuss 2017 malware attack trends to date, including WannaCry, NotPetya, Emotet and more. You’ll learn the similarities and differences about these attacks and how the attack landscape is changing.

    Viewers will learn about:
    * 2017 Malware trends and stats
    * How the threat landscape is changing
    * How to protect your organization

    About the Presenter:
    Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

Embed in website or blog