Videos Archives - IT Security Guru https://www.itsecurityguru.org/category/news/videos/ The Site for our Community Tue, 07 Sep 2021 13:35:28 +0000 en-US hourly 1 https://www.itsecurityguru.org/wp-content/uploads/2019/12/cropped-Guru_Transparent-PNG-1-32x32.png Videos Archives - IT Security Guru https://www.itsecurityguru.org/category/news/videos/ 32 32 Password Security – Now’s the time to get serious https://www.itsecurityguru.org/2021/09/07/password-security-nows-the-time-to-get-serious/?utm_source=rss&utm_medium=rss&utm_campaign=password-security-nows-the-time-to-get-serious Tue, 07 Sep 2021 02:30:31 +0000 https://www.itsecurityguru.org/?p=41252 Did you know that over 80% of breaches involve brute force or lost and stolen credentials, and that over 70% of employees reuse passwords at work? Passwords are on your first line of defence against cyber-attacks and won’t be going away any time soon, getting this piece of the puzzle correct is foundational for cyber defence, the protection […]

The post Password Security – Now’s the time to get serious appeared first on IT Security Guru.

]]>
Did you know that over 80% of breaches involve brute force or lost and stolen credentials, and that over 70% of employees reuse passwords at work? Passwords are on your first line of defence against cyber-attacks and won’t be going away any time soon, getting this piece of the puzzle correct is foundational for cyber defence, the protection of your business and its data.

Live Demo: Supercharge Your Active Directory Password Policy

Join us for a 30-minute live demo of Specops Password Policy focusing on blocking weak passwords and creating compliant password policies.

Darren James, Technical lead at Specops will demonstrate how to:

  • Block weak passwords and create a password dictionary containing potential passwords relevant to your organisation
  • Apply Breached Password Protection to check against the latest leaked lists, including more than 2.5 billion leaked passwords.
  • Create compliant password policies and simplify passwords for users
  • Target password entropy and help users create stronger passwords in Active Directory

WATCH HERE!

 

Darren James – Technical Lead at Specops Software:

Darren has over 25 years of experience in IT, having worked as a consultant across many sectors and many different sizes of organizations from central/local governments, to retail and energy companies. He specializes in IT Security, Active Directory, Azure AD, and Group Policy.

He has worked at Specops for nearly 10 years and he’s been loving every minute!

The post Password Security – Now’s the time to get serious appeared first on IT Security Guru.

]]>
CyberArk Unveils Industry’s Most Complete SaaS Portfolio For Privileged Access Security. https://www.itsecurityguru.org/2019/08/07/cyberark-unveils-industrys-most-complete-saas-portfolio-for-privileged-access-security/?utm_source=rss&utm_medium=rss&utm_campaign=cyberark-unveils-industrys-most-complete-saas-portfolio-for-privileged-access-security Wed, 07 Aug 2019 19:26:36 +0000 https://www.itsecurityguru.org/?p=31900 As the industry leader, only CyberArk has the technology expertise and experience to deliver innovative solutions that make it simple and easy for cloud-first organisations and those embracing digital transformation to consume, use and manage privileged access security solutions, especially in hybrid cloud environments. “Privileged access security is foundational to effective cybersecurity programmes. As our […]

The post CyberArk Unveils Industry’s Most Complete SaaS Portfolio For Privileged Access Security. appeared first on IT Security Guru.

]]>
As the industry leader, only CyberArk has the technology expertise and experience to deliver innovative solutions that make it simple and easy for cloud-first organisations and those embracing digital transformation to consume, use and manage privileged access security solutions, especially in hybrid cloud environments.

“Privileged access security is foundational to effective cybersecurity programmes. As our customers increasingly operate in SaaS and cloud-first environments, it’s critical for CyberArk to build upon our deep knowledge and understanding of the attack surface and deliver innovative security solutions that are built specifically for hybrid environments,” said Udi Mokady, chairman and CEO, CyberArk. “By delivering advanced, easy-to-deploy SaaS solutions, CyberArk is the security partner of choice for modern enterprises.”

Paving the Way for SaaS Innovation in Privileged Access Security

CyberArk is setting a new standard for delivering SaaS-based security solutions with:

Zero Trust Remote Vendor Access with CyberArk Alero – CyberArk Alero is a dynamic solution for mitigating risks associated with remote vendors accessing critical systems through CyberArk. CyberArk Alero also improves operational efficiencies and productivity by making it simple and easy for organisations to provision and manage remote vendor access. This new SaaS-based offering provides Zero Trust access for remote vendors connecting to the CyberArk Privileged Access Security Solution for complete visibility and control of privileged activities. CyberArk is the first and only vendor to combine Zero Trust access, biometric authentication and just-in-time provisioning without the use of VPNs, agents or passwords in one solution. Compared to traditional VPN solutions, CyberArk Alero cuts the onboarding process for remote vendors down from hours to minutes.

Just-in-Time Elevation and Access with CyberArk Endpoint Privilege Manager – CyberArk Endpoint Privilege Manager is an industry leading SaaS-based solution that reduces the risk of unmanaged administrative access on Windows and Mac endpoints. With Endpoint Privilege Manager’s new just-in-time capabilities, organisations can mitigate risk and reduce operational friction by allowing admin-level access to Windows and Mac endpoints on-demand for a specific period of time with a full audit log and the ability to revoke access as necessary. CyberArk is the only privileged access security vendor to provide just-in-time access across cloud and on-premises environments, in data centers and for every endpoint.

Additionally, enhancements to CyberArk Privilege Cloud, CyberArk’s privileged access security as a service offering, enables mid-sized organisations to improve their ability to continuously discover and manage privileged credentials across the enterprise, and record and audit privileged sessions to meet compliance requirements. Support for more than 150 out-of-the-box integrations for credential and privileged session management via the CyberArk Marketplace makes CyberArk Privilege Cloud the easiest solution to integrate into a customer’s existing technology stack.

Availability and Additional Resources

CyberArk Alero and enhancements to CyberArk Endpoint Privilege Manager and CyberArk Privilege Cloud will be available this quarter.

To learn more:

CyberArk Alero: https://www.cyberark.com/products/privileged-account-security-solution/alero/
[Video] CyberArk Alero: https://www.cyberark.com/products/privileged-account-security-solution/alero/#video
CyberArk Endpoint Privilege Manager: https://www.cyberark.com/products/privileged-account-security-solution/endpoint-privilege-manager/
CyberArk Privilege Cloud: https://www.cyberark.com/products/privileged-account-security-solution/cyberark-privilege-cloud/
[Video] CyberArk Privilege Cloud: https://cyberark.wistia.com/medias/akm4r8ai7m

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organisations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.

The post CyberArk Unveils Industry’s Most Complete SaaS Portfolio For Privileged Access Security. appeared first on IT Security Guru.

]]>
The Necurs Botnet https://www.itsecurityguru.org/2016/09/19/the-necurs-botnet/?utm_source=rss&utm_medium=rss&utm_campaign=the-necurs-botnet Mon, 19 Sep 2016 10:44:54 +0000 http://www.itsecurityguru.org/?p=17469 Necurs, thought to be one of the world’s largest botnets, returned online in June this year, and once again began to terrorize victims who got in its path. Necurs is responsible for millions in dollar losses linked to Locky ransomware and Dridex banking Trojan infections. In this short video, AppRiver’s experts discuss how they noticed and questioned […]

The post The Necurs Botnet appeared first on IT Security Guru.

]]>
Necurs, thought to be one of the world’s largest botnets, returned online in June this year, and once again began to terrorize victims who got in its path. Necurs is responsible for millions in dollar losses linked to Locky ransomware and Dridex banking Trojan infections.
In this short video, AppRiver’s experts discuss how they noticed and questioned the significant decrease in the virus traffic.
According to their’s blog the botnet wasn’t taken down earlier in June, but randomly stopped performing its nefarious control of infected computers. With Locky campaigns being very similar to what we’ve seen before, it looks like Necurs is coming back and ramping up.
 
To get the latest insights from AppRiver, sign up to their blog.

The post The Necurs Botnet appeared first on IT Security Guru.

]]>
Locky & Zepto Ransomware https://www.itsecurityguru.org/2016/09/06/locky-zepto-ransomware/?utm_source=rss&utm_medium=rss&utm_campaign=locky-zepto-ransomware Tue, 06 Sep 2016 14:03:42 +0000 http://www.itsecurityguru.org/?p=17223 The growing threat of ransomware attacks in 2016 raises concerns among businesses and consumers alike (“Locky” and “Zepto” being just two examples). In this short video, Appriver’s experts talk about the data cyber attackers are going after and which can kindly be decrypted and returned to the victim in exchange of a particular sum of […]

The post Locky & Zepto Ransomware appeared first on IT Security Guru.

]]>
The growing threat of ransomware attacks in 2016 raises concerns among businesses and consumers alike (“Locky” and “Zepto” being just two examples).
In this short video, Appriver’s experts talk about the data cyber attackers are going after and which can kindly be decrypted and returned to the victim in exchange of a particular sum of money.
To get the latest insights from AppRiver, sign up to their blog.

The post Locky & Zepto Ransomware appeared first on IT Security Guru.

]]>
Social Engineering's Role in Malicious Macros and OLE https://www.itsecurityguru.org/2016/08/30/social-engineerings-role-malicious-macros-ole/?utm_source=rss&utm_medium=rss&utm_campaign=social-engineerings-role-malicious-macros-ole Tue, 30 Aug 2016 10:57:47 +0000 http://www.itsecurityguru.org/?p=17185 What makes macros malware so dangerous is the fact that their authors use the macro power for creating bits of code that can download and execute malicious files when the documents are run on a victims machine. Moreover, recently even the Office object linking and embedding (OLE) capabilities have been misused to trick users into enabling and […]

The post Social Engineering's Role in Malicious Macros and OLE appeared first on IT Security Guru.

]]>
What makes macros malware so dangerous is the fact that their authors use the macro power for creating bits of code that can download and execute malicious files when the documents are run on a victims machine. Moreover, recently even the Office object linking and embedding (OLE) capabilities have been misused to trick users into enabling and downloading harmful content.
In this video AppRiver‘s security experts focus on the ways users are tricked into triggering such hostile software.
To get the latest insights from AppRiver,  sign up to their blog.

The post Social Engineering's Role in Malicious Macros and OLE appeared first on IT Security Guru.

]]>
AppRiver's Predictions for Q3 https://www.itsecurityguru.org/2016/08/08/apprivers-predictions-for-q3/?utm_source=rss&utm_medium=rss&utm_campaign=apprivers-predictions-for-q3 Mon, 08 Aug 2016 10:18:29 +0000 http://www.itsecurityguru.org/?p=16976 So far, 2016 has been a pretty hectic year for cybersecurity professionals – and a lucrative one for hackers. We’ve had some big breaches, massive downtimes and a plethora of e-mail scams. So what can we expect as we head into the second half of what has already been a tumultuous year for the cyber […]

The post AppRiver's Predictions for Q3 appeared first on IT Security Guru.

]]>
So far, 2016 has been a pretty hectic year for cybersecurity professionals – and a lucrative one for hackers.
We’ve had some big breaches, massive downtimes and a plethora of e-mail scams. So what can we expect as we head into the second half of what has already been a tumultuous year for the cyber landscape?
We’ve got this video in from AppRiver, whose Security Analyst Jon French quickly runs through what we can expect to see, as well as why it’s likely. Ransomware has been a big-hitter in 2016 and considering there’s no panacea for it, it’s likely we’ll see it continue to cause trouble for web users worldwide.
To get the latest insights from AppRiver,  sign up to their blog.

The post AppRiver's Predictions for Q3 appeared first on IT Security Guru.

]]>
How to Protect Yourself or Organization from Malware https://www.itsecurityguru.org/2016/08/01/how-to-protect-yourself-or-organization-from-malware/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-protect-yourself-or-organization-from-malware Mon, 01 Aug 2016 08:55:59 +0000 http://www.itsecurityguru.org/?p=16793 Ransomware is one of the most infuriating kinds of cyber attack that’s cropped up over recent years, with hackers raking it in from hapless comouter users who just want their files back. Whilst we all hope for a perfect online community where such things wouldn’t happen, it’s evident that future is a long way away. […]

The post How to Protect Yourself or Organization from Malware appeared first on IT Security Guru.

]]>
Ransomware is one of the most infuriating kinds of cyber attack that’s cropped up over recent years, with hackers raking it in from hapless comouter users who just want their files back.
Whilst we all hope for a perfect online community where such things wouldn’t happen, it’s evident that future is a long way away. So the team at AppRiver have got several tips on how to prepare for the ransomware threat and adjust your security posture so that the hackers don’t get the best of you or your business using this triend and tested attack method. Check out the video above and keep an eye on the Guru website for more from their team of world-renowned experts.
For more, follow AppRiver on Twitter or check out their YouTube channel.

The post How to Protect Yourself or Organization from Malware appeared first on IT Security Guru.

]]>
ITSG Goes to HackFu 2016 with MWR InfoSecurity https://www.itsecurityguru.org/2016/06/28/itsg-goes-to-hackfu-2016-with-mwr-infosecurity/?utm_source=rss&utm_medium=rss&utm_campaign=itsg-goes-to-hackfu-2016-with-mwr-infosecurity Tue, 28 Jun 2016 12:52:55 +0000 http://www.itsecurityguru.org/?p=16337 Not long ago, the Guru received news from MWR InfoSecurity that they were hosting an elite cybersecurity event in the South of England. We sent Dulcie down to see what was happening, as challenges kicked off and 100 experts were tasked with defusing 5 nuclear bombs within 48 hours. To learn more about MWR InfoSecurity, […]

The post ITSG Goes to HackFu 2016 with MWR InfoSecurity appeared first on IT Security Guru.

]]>
Not long ago, the Guru received news from MWR InfoSecurity that they were hosting an elite cybersecurity event in the South of England.
We sent Dulcie down to see what was happening, as challenges kicked off and 100 experts were tasked with defusing 5 nuclear bombs within 48 hours.
To learn more about MWR InfoSecurity, visit: https://www.mwrinfosecurity.com
Follow them on Twitter: https://twitter.com/mwrinfosecurity
For more information on HackFu, including entry for next year and how to run your own event, visit: https://hackfu.mwrinfosecurity.com

The post ITSG Goes to HackFu 2016 with MWR InfoSecurity appeared first on IT Security Guru.

]]>
AppRiver: How much money have companies been paying? https://www.itsecurityguru.org/2016/06/17/appriver-how-much-money-have-companies-been-paying/?utm_source=rss&utm_medium=rss&utm_campaign=appriver-how-much-money-have-companies-been-paying Fri, 17 Jun 2016 10:22:14 +0000 http://www.itsecurityguru.org/?p=16179 Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing what companies have actually been paying in light of cyber attacks. It turns out the answer is a LOT. Rsearch shows potentially billions of dollars has been lost through wire […]

The post AppRiver: How much money have companies been paying? appeared first on IT Security Guru.

]]>
Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing what companies have actually been paying in light of cyber attacks.
It turns out the answer is a LOT. Rsearch shows potentially billions of dollars has been lost through wire transfer fraud, ransom payments and other extortion and fraud techniques. How do these scams work? Listen to AppRiver’s advice and don’t get caught out!
Tune in and join AppRiver as we share with you their expertise, gleaned from their unique position as heads of a global security operation. To find out more about their research and work, visit their website or give them a follow on twitter.

The post AppRiver: How much money have companies been paying? appeared first on IT Security Guru.

]]>
Is there any way to fix being ransomed or is it hopeless? https://www.itsecurityguru.org/2016/06/10/is-there-any-way-to-fix-being-ransomed-or-is-it-hopeless/?utm_source=rss&utm_medium=rss&utm_campaign=is-there-any-way-to-fix-being-ransomed-or-is-it-hopeless Fri, 10 Jun 2016 10:26:00 +0000 http://www.itsecurityguru.org/?p=16072 Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing ransomware and what the reality is when you get hit by it. Ransomware has become very sophisticated through the use of different forms of communication, payment and browsing tools that […]

The post Is there any way to fix being ransomed or is it hopeless? appeared first on IT Security Guru.

]]>
Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing ransomware and what the reality is when you get hit by it.
Ransomware has become very sophisticated through the use of different forms of communication, payment and browsing tools that allow criminals to remain off-grid and to carrry on their illegal activities undisturbed. Looking at many of the pieces of ransomware put out by malware authors, we can see how the trend is developing and why so  many cyber criminals are eager for a slice of the pie.
Tune in and join AppRiver as we share with you their expertise, gleaned from their unique position as heads of a global security operation. To find out more about their research and work, visit their website or give them a follow on twitter.

The post Is there any way to fix being ransomed or is it hopeless? appeared first on IT Security Guru.

]]>