Defining the Value of Machine Learning for Endpoint Protection
Computer Business Review recently published an interview with CrowdStrike® Chief Scientist Dr. Sven Krasser, “Machine learning in cybersecurity: The first line of…
Computer Business Review recently published an interview with CrowdStrike® Chief Scientist Dr. Sven Krasser, “Machine learning in cybersecurity: The first line of…
Decluttering Your IT “Desk” There is an old adage that claims “a messy desk is the sign of genius.” Although many of…
An article in InfoTech by CrowdStrike CISO Jerry Dixon, “How to Future-proof Your Security Operations,” explains the dilemma that many security operations…
One of the findings in the 2017 Verizon Data Breach Investigations Report (DBIR) is that only 51 percent of cyberattacks involve malware.…
Today’s data centers are a showcase for rapid innovation. Organizations now have complete flexibility in how their data centers are architected, built…
SANS Institute analysts have published a review of the CrowdStrike Falcon® platform, offering valuable third-party insight into Falcon capabilities to protect organizations…
The trouble with dwell time Dwell time, the period between when an attack occurs and when it is discovered, continues to be…
Blog updated: May 14th In this screenshot example from the Falcon UI, the detection process tree shows that the malicious file associated…
Global statistics in the most recent Ponemon report on the cost of a data breach show dwell time for malicious attacks has…
The 2017 Verizon Data Breach Investigations Report (DBIR) marks the 10th year this prestigious report has been published and as in year’s…