<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1018517621595528&amp;ev=PageView&amp;noscript=1">

Barkly in the news

account_box Maya Pattisonemail press@barkly.com

Wired Icon 

Wired

Ransomware Turns to Big Targets — With Even Bigger Fallout

Until last year people didn’t even think about ransomware as an attack where the privacy of the information was being...”

SecurityWeek Icon 

Entrepreneur

5 Things You Need to Know About the New (and Scary) Wave of 'File-less' Cyber Attacks

With no files to scan, detecting and blocking fileless attacks ultimately comes down to your IT department's ability to identify malicious activity and behaviors on the end point -- ideally before any damage is done. There are new end-point solutions that can accomplish that task and stop fileless attacks in real time and before they are able to compromise the device. IT and security leaders should investigate their options to determine the right solution for keeping their organizations safe.”

Beckers Icon 

SecurityWeek

Fileless Attacks Ten Times More Likely to Succeed: Report

The biggest problem with most current solutions, according to the Ponemon study, is that they do not provide adequate protection. Barkly's Jack Danahy is not surprised. 'You cannot claim to do endpoint protection unless you can stop both file-based and fileless attacks before they get through and harm the client. A fileless attack is ten times more likely to succeed than a file-based attack.'”

As seen in:
Wired Wall Street Journal SC Magazine Entrepreneur Magazine CSO Infosecurity Dark Reading CIO SecurityWeek Washington Post

Recent coverage includes: