Featured Articles
Recent Articles
Categories
Cloud Security
-
CrowdStrike Discovers Vulnerability in Flexera’s FlexNet Inventory Agent (CVE-2023-29082)
December 8, 2023
-
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent 2023
November 30, 2023
-
The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software
November 17, 2023
Counter Adversary Operations
-
How Malicious Insiders Use Known Vulnerabilities Against Their Organizations
December 7, 2023
-
5 Tips to Defend Against Access Brokers This Holiday Season
November 16, 2023
-
IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations
November 9, 2023
Endpoint Security & XDR
Engineering & Tech
-
CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at Telecommunications Customer
September 27, 2023
-
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 2
September 1, 2023
-
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 1
August 25, 2023
Executive Viewpoint
-
CrowdStrike Named a Leader with a “Stellar” MDR Offering in The Forrester Wave™: Managed Detection and Response Services in Europe, Q4 2023
December 14, 2023
-
CrowdStrike Brings AI-Powered Cybersecurity to Small and Medium-Sized Businesses
November 15, 2023
-
CrowdStrike a “Customers’ Choice” — Received One of the Highest Ratings in 2023 Gartner® Peer Insights™ Voice of the Customer for Endpoint Protection Platform Report
September 20, 2023
From The Front Lines
Identity Protection
-
Identity Threat Hunting: How CrowdStrike Counter Adversary Operations Is Leading the Charge
December 11, 2023
-
Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks
November 17, 2023
-
Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability
July 14, 2023
Observability & Log Management
-
Eliminate Repetitive Tasks and Accelerate Response with Falcon Fusion
November 20, 2023
-
Falcon LogScale Users Gain Better Threat Hunting with Chrome Enterprise Security Telemetry
September 14, 2023
-
Move from a High-Cost Legacy SIEM to High-Speed Falcon LogScale
September 6, 2023
People & Culture
Remote Workplace
Tech Center
-
Protecting Users from Malicious Sites with Falcon for Mobile
October 26, 2023
-
Getting Value from Your Proxy Logs with Falcon LogScale
October 10, 2023
-
How to Complete Your LogScale Observability Strategy with Grafana
May 15, 2023
Resource Center
Dive into topics ranging from endpoint security and threat intelligence, to incident response and forensic services.
See CrowdStrike Falcon® in Action
Only CrowdStrike addresses today’s most advanced threats with a true SaaS endpoint protection solution – giving you the ability to detect, prevent, monitor, and search attacks as they occur.
See Demo

