Archer
Archer
  • Видео 528
  • Просмотров 83 289
The World of Surveillance Operations
In this episode of DirectConnect, Nick Weber, Managing Partner at Archer, dives deep into Surveillance Operations with Carlos Francisco, Sandra Stibbards and Scot Walker.
Would just like to learn more about Archer Energy Solutions and what we do? Head over to our website @ www.archerint.com, give us a call @ 1-800-805-7411 or email us @ contact@archerint.com, we’d love to hear from you!
#Surveillance #Undercover #ArcherEnergySolutions #CriticalInfrastructure #PhysicalSecurity #Podcast #Cybersecurity #Compliance #FERC #NERC #CIPStandards #FiresideChat #Fortune500
Просмотров: 17

Видео

#FERC / Lessons Learned Report
Просмотров 99 часов назад
On this episode of On Target, Steve Parker, Managing Partner at Archer, talks about the Lessons Learned from the Commission-Led CIP Reliability Audits. Link to the Report: ferc.gov/sites/default/files/2024-08/24_Lessons Learned_0826.pdf Welcome to On Target with Archer, a weekly video series where we answer an important question or discuss a hot topic, from the serious to the not so serious. Tu...
Mastering the NERC Compliance Requirements
Просмотров 38День назад
On this episode of On Target, Stacy Bresler, Managing Partner at Archer, dives into the importance of understanding NERC compliance requirements beyond the usual audit practices. Stacey highlights the need for role-based, comprehensive training and urges organizations to continually mature their programs, rather than just meeting the minimum standards. Tune in to learn how to better prepare for...
Lowering Risk Via Automation - Guest Austin Rappeport
Просмотров 4514 дней назад
In this episode of DirectConnect, Leonard Chamberlin, Managing Partner at Archer, sits down with Austin Rappeport to talk about how we can lower risk through the use of automation. Would just like to learn more about Archer Energy Solutions and what we do? Head over to our website @ www.archerint.com, give us a call @ 1-800-805-7411 or email us @ contact@archerint.com, we’d love to hear from yo...
Advice if You're New to Compliance Management
Просмотров 3614 дней назад
On this episode of On Target, Nick Weber, Managing Partner at Archer, gives a little advice to the Compliance Managers that may just be starting out or were thrust into the role. Welcome to On Target with Archer, a weekly video series where we answer an important question or discuss a hot topic, from the serious to the not so serious. Tune in every Monday for a new video and let us know in the ...
How Can I Secure My Cloud-Based Data and Applications? - Ask Archer
Просмотров 4021 день назад
How can I secure my cloud-based data and applications? ☁️ Ask Archer: Securing Your Cloud-Based Data and Applications ☁️ Concerned about the security of your cloud-based data and applications? Archer’s here with essential tips, to keep your cloud environment safe! 🔒 1. Use Strong Authentication: Implement multi-factor authentication to ensure that only authorized users can access your cloud res...
Make Sure to Have Fun!
Просмотров 3721 день назад
On this episode of On Target, Stacy Bresler, Managing Partner at Archer, pauses for a moment to remind us that we do hard work and to stop what you’re doing and have some fun, otherwise we burn out. Welcome to On Target with Archer, a weekly video series where we answer an important question or discuss a hot topic, from the serious to the not so serious. Tune in every Monday for a new video and...
What is Endpoint Security? - Ask Archer
Просмотров 5328 дней назад
🔐 Ask Archer: Understanding Endpoint Security 🔐 Ever heard of endpoint security but not sure what it means or why it’s important? Archer’s here to shed some light! 💻 What is Endpoint Security?: Endpoint security involves protecting all endpoints-such as laptops, smartphones, tablets, and other devices-that connect to your network. It includes measures like antivirus software, firewalls, intrusi...
What are The Kindness Games? #thekindnessgames
Просмотров 8428 дней назад
What are The Kindness Games? #thekindnessgames
The Difference Between a Program and a Plan #NERC #FERC
Просмотров 40Месяц назад
The Difference Between a Program and a Plan #NERC #FERC
How do I identify and Prioritize Risks Within my Organization? - Ask Archer
Просмотров 48Месяц назад
How do I identify and Prioritize Risks Within my Organization? - Ask Archer
The "Not So Simple" CIP Standards #NERC #cipstandards
Просмотров 69Месяц назад
The "Not So Simple" CIP Standards #NERC #cipstandards
What are the Eleven Critical Infrastructure Sectors? - Ask Archer
Просмотров 88Месяц назад
What are the Eleven Critical Infrastructure Sectors? - Ask Archer
SBOM: Software Bill of Materials - Guest Chris Blask
Просмотров 72Месяц назад
SBOM: Software Bill of Materials - Guest Chris Blask
Essential Reliability Services - MRO’s Number Eight Regional Risk
Просмотров 53Месяц назад
Essential Reliability Services - MRO’s Number Eight Regional Risk
What are the Biggest Cyber Attacks on Critical Infrastructure? - Ask Archer
Просмотров 95Месяц назад
What are the Biggest Cyber Attacks on Critical Infrastructure? - Ask Archer
Cybersecurity 101: Cyber Forensics Like CSI Miami!
Просмотров 84Месяц назад
Cybersecurity 101: Cyber Forensics Like CSI Miami!
IBR and DER Performance - MRO’s Number Four Regional Risk
Просмотров 62Месяц назад
IBR and DER Performance - MRO’s Number Four Regional Risk
What is Risk Assessment and Why is it Important? - Ask Archer
Просмотров 83Месяц назад
What is Risk Assessment and Why is it Important? - Ask Archer
Cybersecurity 101: The Deep Web!
Просмотров 137Месяц назад
Cybersecurity 101: The Deep Web!
Equipment Unavailability - MRO’s Number Five Regional Risk
Просмотров 69Месяц назад
Equipment Unavailability - MRO’s Number Five Regional Risk
Why is Protecting Critical Infrastructure Important? - Ask Archer
Просмотров 1112 месяца назад
Why is Protecting Critical Infrastructure Important? - Ask Archer
Cybersecurity 101: VPN!
Просмотров 2682 месяца назад
Cybersecurity 101: VPN!
Malicious Insider Threat - MRO’s Number Seven Regional Risk
Просмотров 742 месяца назад
Malicious Insider Threat - MRO’s Number Seven Regional Risk
Vulnerability VS Exploit - Ask Archer
Просмотров 1912 месяца назад
Vulnerability VS Exploit - Ask Archer
Cybersecurity 101: A closer look at Footprinting
Просмотров 5122 месяца назад
Cybersecurity 101: A closer look at Footprinting
NERC CIP Challenges - Guest Tim Starr
Просмотров 1342 месяца назад
NERC CIP Challenges - Guest Tim Starr
Extreme Cold Weather - MRO’s Number Two Regional Risk
Просмотров 1582 месяца назад
Extreme Cold Weather - MRO’s Number Two Regional Risk
Understanding Cyber Attacks - Ask Archer
Просмотров 1092 месяца назад
Understanding Cyber Attacks - Ask Archer
Cybersecurity 101: Malware!
Просмотров 2162 месяца назад
Cybersecurity 101: Malware!

Комментарии

  • @ScotWalkersProtectiveFuture
    @ScotWalkersProtectiveFuture 2 дня назад

    Thanks for having us on Nick and Archer! Carlos, Sandra, and I had a lot of fun!

    • @ArcherU
      @ArcherU День назад

      @@ScotWalkersProtectiveFuture This episode turned out great! 😊

  • @bilalsaadaoui
    @bilalsaadaoui 28 дней назад

    Suggestion for future topics in Cyber101: Zero Trust

  • @astebbin
    @astebbin Месяц назад

    “Name every sector of the economy except fashion, toys, tourism and entertainment”

  • @ArcherU
    @ArcherU Месяц назад

    Is there a topic you'd like to see us cover? Leave it in the comments!

  • @bilalsaadaoui
    @bilalsaadaoui Месяц назад

    Suggestion for future topics in Cybersecurity 101: SQL injection

    • @ArcherU
      @ArcherU Месяц назад

      @@bilalsaadaoui thank you!

  • @trollerbladdering
    @trollerbladdering Месяц назад

    Q: Are you running Windows 10/11? A: Your computer is compromised by at least 3 government agencies from around the world. Please remove and install Linux.

  • @RevelMediaPro
    @RevelMediaPro 2 месяца назад

    Go Blue Jays!!

  • @user-ol7tl1vf5m
    @user-ol7tl1vf5m 2 месяца назад

    Cyber attacks against businesses that choose centralized setups to store sensitive information are akin to inviting the cyber world to target them. Centralized systems present a single point of failure, making them more vulnerable to sophisticated cyber threats looking to exploit weaknesses for malicious purposes.

    • @ArcherU
      @ArcherU 2 месяца назад

      @@user-ol7tl1vf5m great point!!

  • @baby_boss1234
    @baby_boss1234 2 месяца назад

    You're a susy baka

    • @ArcherU
      @ArcherU 2 месяца назад

      Don’t forget to “like” and subscribe!

    • @baby_boss1234
      @baby_boss1234 2 месяца назад

      @@ArcherU Are you the one voicing the video or its AI?

    • @ArcherU
      @ArcherU 2 месяца назад

      @@baby_boss1234 it’s not AI.

  • @tasiatasia1435
    @tasiatasia1435 2 месяца назад

    Thank you for this beautiful video and explanation. You need more views!

    • @ArcherU
      @ArcherU 2 месяца назад

      Thank you!! 🙏🏼

  • @MountainMan7.62x39
    @MountainMan7.62x39 2 месяца назад

    Why did I just watch this video, as opposed to asking ChatGPT this crap myself?

  • @angieegler3660
    @angieegler3660 2 месяца назад

    Thanks for this!

  • @StacyBresler
    @StacyBresler 3 месяца назад

    It’s much like backdating legal documents or a check.

    • @ArcherU
      @ArcherU 3 месяца назад

      That’s a great way to put it!

  • @daliamellin2747
    @daliamellin2747 3 месяца назад

    ❤❤😮😊😊

  • @ArcherU
    @ArcherU 3 месяца назад

    Do you have any other interesting information that Mark may have missed about Human-as-a-Service?

  • @ArcherU
    @ArcherU 3 месяца назад

    Do you have any good advice or tips when working remotely?

  • @StacyBresler
    @StacyBresler 3 месяца назад

    Love the ghost bot!!!

  • @Bupeshimakwebo
    @Bupeshimakwebo 4 месяца назад

    I like your videos they are unique

    • @ArcherU
      @ArcherU 4 месяца назад

      Thank you very much!!

  • @D.von.N
    @D.von.N 4 месяца назад

    As it turns out, hackers are always one step ahead of our security measures. For every security measure there is a hack. Both sides are evolving. Yesterday I watched Liron Segev demonstrating a $5000 malware leaking from a virtual machine into the PC. Figure that out! Quite recently we were a tiny step from having all servers and PCs in the world affected by XZ backdoor hack. They are after us. Your protective behaviour and equipment will last only as long as it hasn't met its match. Yet.

    • @ArcherU
      @ArcherU 4 месяца назад

      Exactly, as soon as you put out something, they can protect you. They figure out a way to get around it. The endless cycle.

  • @D.von.N
    @D.von.N 4 месяца назад

    You must be using a different bot because mine tends to give me lengthy paragraphs with explanations. I rarely see a one or two lines answers. And kudos to your health improvements. Use it or lose it - body, muscles, brain cells... walking alone is very beneficial for health and IT people hugely neglect it. To their detriment. PS: that sound effect in the background is disturbing my attention. Could it go without it next time? AI will be probably able to extract your voice anyway, or they can get it other ways if they wanted it. Like cold callers.

    • @ArcherU
      @ArcherU 4 месяца назад

      It’s all in how I set it up. Before I start, I ask it to keep the answers short. Because yes, the answers will be super long!

  • @chrisg9886
    @chrisg9886 4 месяца назад

    I like how you are using gpt to teach you and in turn teach others , these days ppl try the “get rich quick” scheme of having an ai generated voice over , keep learning and helping others with your content!

    • @ArcherU
      @ArcherU 4 месяца назад

      Thank you!! I’m just trying to learn this crazy stuff lol - thank you for your nice comment!

  • @JasonPOWERVR
    @JasonPOWERVR 4 месяца назад

    Fantastic Podcast! I like how you are approaching the subject of "Evolution" of physical security. We have been seeing a trend to throw more concrete at the problem. I really like how the three of you look at the challenges and apply practical solutions. Well done.

  • @dmitya26
    @dmitya26 4 месяца назад

    Hashing is a one way function that is used as a secure way to store passwords and other things. It is a one way function in that it cannot be reversed like encryption. Validating passwords using hashing functions is based on a principle known as the zero-knowledge proof. Meaning, hashing is so brilliant for password validation because you don't actually need to know the password in order to validate it. Since hashing a password is going to turn it into a string of characters unrecognizable from the original, you can hash the password the person puts when they log in, and compare it with the hashed password for that user in the database. I might've gotten something wrong, it's been a while since I've looked at hashing, so be sure to validate what I'm saying. Regardless, hope this helped!! :-)

  • @daniel06498
    @daniel06498 5 месяцев назад

    You deserve more views great video btw

    • @ArcherU
      @ArcherU 5 месяцев назад

      Thank you! We really enjoyed this one!

  • @caudillo7878
    @caudillo7878 5 месяцев назад

    malware bytes is a good free one

  • @caudillo7878
    @caudillo7878 5 месяцев назад

    In simplest terms, sandboxing just means "to isolate" essentially. For example, if you are analyzing malware - you want to do this in a "sandboxed environment" away from any other systems. To accomplish this, one might set up a Virtual Machine just for malware analysis and put it on an isolated Virtual LAN. This way, even if malware were to attempt to propagate itself through a network - it would have no where to go, in theory. There are many reasons you may want to set up a Sandbox.

    • @ArcherU
      @ArcherU 5 месяцев назад

      Great explanation! Thank you! 🙏🏼

    • @caudillo7878
      @caudillo7878 5 месяцев назад

      @@ArcherU Sure, an example of a defense use-case would be to isolate a web server from the rest of a local area network by setting up a sandbox. You want the web server to be connected to and accessible from the internet(it's hosting a website after all), but in case this web server were to become compromised somehow, you don't want it to be linked to your other devices in your home, lab, or domain. The risk here is the internet. Malicious users can access your website, they could find a vulnerability, and maybe exploit it to gain access to the web server or something like that. If this were to happen, you don't want the threat actor to then be able to move laterally through your network. You want to contain the threat, and stop the spread - this is what sandboxing accomplishes in this use-case. I'm sure you can think now of many other reasons you may want to 'set up a sandbox'.

    • @ArcherU
      @ArcherU 5 месяцев назад

      Thank you for sharing such a detailed explanation! Your insights are really helpful in understanding the importance of sandboxing in cybersecurity.

  • @laynamcvay310
    @laynamcvay310 5 месяцев назад

    So glad you guys enjoyed the WICF workshop and the breakouts!!

  • @pratapanurag757
    @pratapanurag757 5 месяцев назад

    Heyaa, I came across your video, and its really well presented! . As someone promising youtubers guaranteed growth.. I believe there are strategies that could enhance your reach. Would you be open to discussing ideas over a quick call? No pressure, just aiming to share valuable insights.

  • @Fludentify
    @Fludentify 5 месяцев назад

    Thank you for the videos you are sharing. 😊

    • @ArcherU
      @ArcherU 5 месяцев назад

      Thank you for the nice comment! 👍🏻

  • @philjack8535
    @philjack8535 5 месяцев назад

    I have 2 degrees in cybersecurity, its giving you a 10,000 foot view. There are many tools available such as forensics tools like e3 or autopsy, builtin tools like PStools or things like sysinternals that would allow you to actually find evidence of infection without relying on AV programs.

  • @onionknight249
    @onionknight249 5 месяцев назад

    Wait man you just read it out of chat gpt??

    • @tetst_54546
      @tetst_54546 5 месяцев назад

      At least he is being honest. Anyway.. we reached peak of human invention for sure :D ..

    • @onionknight249
      @onionknight249 5 месяцев назад

      ​@@tetst_54546 agreed we have reached peak human invention, i don't know maybe its just me but i thought there will be some practical showcase of how things happen or how to prevent them but was met with a sad vibe while reading off chatgpt.

    • @onionknight249
      @onionknight249 5 месяцев назад

      @@tetst_54546 agreed we have indeed reached peak human invention, i don't know maybe its just me but i thought there will be some practical showcase of how things happen and how to prevent it but was met with a sad vibe while reading out of chatgpt

  • @kiaraki7186
    @kiaraki7186 5 месяцев назад

    naah mid as content

  • @pratapanurag757
    @pratapanurag757 6 месяцев назад

    I landed on your video and it's really good and editing is good as well, pls don't mind but I saw on your channel, you posted quite good number of videos and I can see the current reach is not that good. You can improve your reach by focusing collectively on thumbnails, specially in your niche improving SEO would be a deal breaker and the video editing. If you want to get it sorted then I would love to have a conversation..

  • @Joestorm2000
    @Joestorm2000 6 месяцев назад

    My brother got a scam call today from "Amazon" asking to confirm his "order of $1500". He just told them "yep, that was me!". All he got back was "uh... okay" and then they hung up. I'm definitely going to try this the next chance I get.

    • @ArcherU
      @ArcherU 6 месяцев назад

      Nice!!

  • @AcmePhoto
    @AcmePhoto 6 месяцев назад

    It was Stacy's mom. (the pedophile)

  • @B0tname
    @B0tname 6 месяцев назад

    Nice blur mark hemmingway

  •  6 месяцев назад

    We have a saying at work: the CEO will never signed his text message with his name (who does that?) nor will ask you to buy him gift cards.

  • @caposolomon8745
    @caposolomon8745 6 месяцев назад

    Why would anyone pretend to be your boss?

    • @notme222
      @notme222 6 месяцев назад

      If the employee is trusted to handle money, a common followup is to ask them to pay a (fraudulent) bill. There was even a case a few weeks ago where someone used deepfakes to fake a bosses appearance on a Zoom call and ask for a money transfer.

    • @Vidicon31
      @Vidicon31 6 месяцев назад

      To make you quickly pay a large important invoice or something like that.

  • @Rainos62
    @Rainos62 6 месяцев назад

    I have my bosses number saved so i once had this and immediately called it said the same thing. next morning told my boss had a meeting. gave the number to HR and our cyber security division got the person arrested in 2 weeks

  • @lmitz
    @lmitz 6 месяцев назад

    I could see myself getting this wrong and coming in to work the next day only to find out I'm canned

    • @ArcherU
      @ArcherU 6 месяцев назад

      There was a moment that I was a little worried. But I know my boss isn’t that quick to fire people. At least not that I know of lol 😂

  • @kiru3728
    @kiru3728 6 месяцев назад

    blurring doesn't work too well to stop info, just use a black box o/ Mr Hemmingway

  • @psychedelicprimate8974
    @psychedelicprimate8974 6 месяцев назад

    These new millennial scams are interesting.

    • @XTaskPassX
      @XTaskPassX 6 месяцев назад

      Phishing message scams has been a thing since the 1990s

    • @psychedelicprimate8974
      @psychedelicprimate8974 6 месяцев назад

      I'm not talking about the when, I'm talking about the target. They know they can't get us like they do with the boomers and their gift cards.

  • @markhemingway
    @markhemingway 6 месяцев назад

    Thanks! Also, they blocked me after I called their bluff. :)

  • @philm.8756
    @philm.8756 6 месяцев назад

    You are really good at these, MM!

  • @RevelMediaPro
    @RevelMediaPro 6 месяцев назад

    Great information! Thank you!

  • @CallowayMovies
    @CallowayMovies 6 месяцев назад

    please fix your title. Black hat / White hat (evil vs good) Edited* it really does matter.

    • @CallowayMovies
      @CallowayMovies 6 месяцев назад

      or even white hat / black hat. White should always come first unless your black hat. But, you also forgot the new. Grey hat.

    • @ArcherU
      @ArcherU 6 месяцев назад

      Will do! Thanks!

    • @ArcherU
      @ArcherU 6 месяцев назад

      Wasn’t aware of Grey hat. Good to know!

    • @CallowayMovies
      @CallowayMovies 6 месяцев назад

      @@ArcherU Nothing but love. i hope your channel grows. When talking about hackers "coders/ scripters" be very careful and def increase your home/ office cyber security. Some of the best coders are children. with that being said you can guess what im getting at.

    • @ArcherU
      @ArcherU 6 месяцев назад

      Thank you!@@CallowayMovies

  • @ArcherU
    @ArcherU 6 месяцев назад

    CYBERSECURITY BASELINES FOR ELECTRIC DISTRIBUTION SYSTEMS AND DER: pubs.naruc.org/pub/35247A70-0C45-9652-C6D9-99A77C87200F?_gl=1*fk32am*_ga*OTAzNzYyNTg0LjE2NzMzMTcyNTU.*_ga_QLH1N3Q1NF*MTcwODgzOTgyMy4xMS4wLjE3MDg4Mzk4MjMuMC4wLjA

  • @typictrain
    @typictrain 6 месяцев назад

    ⏲️

  • @CreachterZ
    @CreachterZ 6 месяцев назад

    I ran customer websites on my own server at a colo on Linux around 2000. Rootkits were huge. I had a cd-rom I could mount with the common targets of rootkits to hide infection such as ls, ps, etc. it worked well.

    • @ArcherU
      @ArcherU 6 месяцев назад

      It’s been around for a while!

    • @CreachterZ
      @CreachterZ 6 месяцев назад

      @@ArcherU Are you calling me old? 😆 I installed Slackware from 52 disks I downloaded from a BBS. Now they pay me to do this stuff!

    • @ArcherU
      @ArcherU 6 месяцев назад

      @@CreachterZ if you’re old, than so am I! LOL 😂

    • @CreachterZ
      @CreachterZ 6 месяцев назад

      @@ArcherU Hugs, brother.

  • @ChristopherFranklin235
    @ChristopherFranklin235 6 месяцев назад

    I thought a human was going to explain this to me but…I also have chat gpt…so I’m a little annoyed I got baited into this video…

    • @ArcherU
      @ArcherU 6 месяцев назад

      No bait intended. Mark’s just trying to learn about the cybersecurity world. Thank you for your honest input.