Stats & Trends

From PoC to Pwned: New Exploits Appear in Attacks Just Days After Disclosure

Recently, I  identified five Microsoft Office vulnerabilities from 2017 and 2018 that helped fuel an ongoing wave of attack campaigns. The security weaknesses were zero-days at the time of their...

Read More
Featured
How to

5 Simple Ways to Block Most Malware, Even if You Don't Have a SOC

If you’re in charge of protecting a small or mid-size business from malware attacks, we have good news and bad news. First, the bad news: Malware...

Read More
Jun 2018
How to

How to Respond to Incident Alerts in the New Barkly

In the old days of endpoint security, when you were using signature-based AV, incident alerts were clear cut. If your AV quarantined a file, you...

Read More
Apr 2018
How to

Malware Prevention: 3 Big, Risky Gambles SMBs Inadvertently Make

Counting on luck is something you do at the craps table or when you play the lottery. It obviously isn't a position you want to be in with your...

Read More
Mar 2018
How to

IT Checklist: 15 Ways to Keep Your Company Secure During the Olympics

The 2018 Winter Olympics are set to run from February 9 - 25, with NBC promising 1,800 hours of live streaming coverage along with extensive...

Read More
Feb 2018
How to

A Clear Guide to Meltdown and Spectre Patches

Ever since news of Meltdown and Spectre — two massive CPU vulnerabilities affecting nearly every operating systems and device — hit, vendors have...

Read More
Jan 2018
How to

Meltdown and Spectre Mitigation: 3 Practical Things to Do Now

News of Meltdown and Spectre — two CPU vulnerabilities affecting nearly all operating systems and devices — has taken the IT and security worlds...

Read More
Jan 2018
How to

10 InfoSec Experts We're Thankful For

It's the time of year for taking stock and expressing thanks, and we're celebrating by acknowledging 10 remarkably generous infosec experts we're...

Read More
Nov 2017
How to

Introducing Stackhackr: Test Your Security by Building Mock Malware

See how safe your company is from malware — by building your own Stackhackr lets you create and customize your own mock malware that simulates...

Read More
Jun 2017
How to

Data vs. Defeatism: 4 Keys to Stronger Security with AlienVault’s Javvad Malik

At Barkly, we've been talking with our customers about the importance of a holistic approach to their defensive strategy, particularly with the...

Read More
May 2017
How to

3 Cybersecurity New Year's Resolutions (Plus Cheat Sheets for Actually Keeping Them)

What's better than aspirational resolutions? Practical tips for getting them done. Do these three things and you'll make your organization...

Read More
Jan 2017