Compliance Q&A with CrowdStrike CIO Colin Black
CrowdStrike recently started to release a series of independent reports assessing the efficacy of the Falcon Host endpoint protection solution in helping…
CrowdStrike recently started to release a series of independent reports assessing the efficacy of the Falcon Host endpoint protection solution in helping…
When we tell customers that malware is just a minor part of the overall security breach problem, they often ask what a…
The sophisticated threat actor COZY BEAR was initially identified in 2014. This actor has many other names in the information security community,…
Without a doubt, Black Hat is one of the marquee events that gathers together the entire security industry. Looking at this year’s…
Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*. This is…
Network intrusions have become a fact of corporate life, and increasingly are viewed as among the many costs of doing business. How…
I’d love to tell you about all the cool stuff in our Falcon platform winter release. It represents a huge step forward…
According to a recent Harvard Business Review report, 84 percent of enterprises have increased their Cloud usage in the past year. Fueling…
As organizations grow and become more distributed, adding more endpoints across the enterprise, sophisticated adversaries will continue to aggressively target their data…
This is the first in a recurring series that explores the functions, categories and subcategories of the National Institute of Standards &…