Categories
Cloud and Application Security
-
Key Findings from CrowdStrike’s 2024 State of Application Security Report
February 13, 2024
-
How to Secure Business-Critical Applications
February 9, 2024
-
CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks
February 5, 2024
Counter Adversary Operations
Endpoint Security & XDR
-
CrowdStrike Customers Share Benefits of Cybersecurity Consolidation and Technology Integrations
February 26, 2024
-
Seeing into the Shadows: Tackling ChromeOS Blind Spots with Dell and CrowdStrike
February 14, 2024
-
CrowdStrike Named the Only Customers’ Choice: 2024 Gartner® “Voice of the Customer” for Vulnerability Assessment
February 14, 2024
Engineering & Tech
-
CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at Telecommunications Customer
September 27, 2023
-
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 2
September 1, 2023
-
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 1
August 25, 2023
Executive Viewpoint
-
CrowdStrike Is Proud to Sponsor the Mac Admins Foundation
February 15, 2024
-
CrowdStrike Named a Leader with a “Stellar” MDR Offering in The Forrester Wave™: Managed Detection and Response Services in Europe, Q4 2023
December 14, 2023
-
CrowdStrike Brings AI-Powered Cybersecurity to Small and Medium-Sized Businesses
November 15, 2023
From The Front Lines
Identity Protection
-
Falcon Fund in Focus: Aembit Strengthens Security for Workload-to-Workload Access
January 30, 2024
-
Identity Threat Hunting: How CrowdStrike Counter Adversary Operations Is Leading the Charge
December 11, 2023
-
Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks
November 17, 2023
Next-Gen SIEM & Log Management
People & Culture
Remote Workplace
Tech Center
-
CrowdStrike Falcon LogScale S3 ingest
November 9, 2023
-
Protecting Users from Malicious Sites with Falcon for Mobile
October 26, 2023
-
Getting Value from Your Proxy Logs with Falcon LogScale
October 10, 2023