A Primer on Machine Learning in Endpoint Security
Although machine learning (ML) isn’t a new concept — it actually dates back to the origins of the computer itself — it…
Although machine learning (ML) isn’t a new concept — it actually dates back to the origins of the computer itself — it…
A recent survey by the Cloud Security Alliance found, among other things, that out of a sampling of 2,542 anomalous event alerts,…
Though PCs still dominate the workplace, Macs continue to gain ground as the platform of choice for many organizations. As an indication…
Organizations have long been aware of their vulnerability when it comes to email and yet phishing scams continue to be profitable, as…
Event Stream Processing (ESP) has been a central component of CrowdStrike Falcon’s IOA approach since CrowdStrike's inception. In this post we'll take…
Recent reports of SCADA/ICS proof-of-concept ransomware have spurred fresh discussion on the topic. Few threats exceed the level of concern that ransomware…
A recent article on DarkReading.com, titled “4 Reasons Why You Should Take Ransomware Seriously,” outlines the persistence of ransomware as a significant…
"Visionaries not only believe that the impossible can be done, but that it must be done." — Bran Ferren. I am thrilled…
Ransomware attacks fall into two general categories – encrypting and non-encrypting. The first type encrypts files on your hard drive and forces…
Earlier this year, CrowdStrike released Falcon Orchestrator as a contribution to the open source community. By leveraging the robust Falcon Connect API…