CrowdResponse Application Execution Modules Released
As the user base of CrowdResponse multiplies, we see a steady stream of requests from active users. Many use the tool for…
As the user base of CrowdResponse multiplies, we see a steady stream of requests from active users. Many use the tool for…
There are multiple ways to use threat intelligence to monitor networks for suspicious activity -- our Falcon Host platform does it by…
In our last post, Shawn Henry, president of CrowdStrike Services and sought-after cybersecurity expert, talked with us about cybersecurity trends in 2014…
We recently spoke with cybersecurity expert Shawn Henry, president of CrowdStrike Services and former Executive Assistant Director of the Federal Bureau of…
This month on The Adversary Manifesto we’ve been talking a lot about National Cyber Security Awareness Month (NCSAM). While for those of…
The Adversary Manifesto recently spoke with Shawn Henry, President of CrowdStrike Services about geopolitics and cybersecurity. Henry is a sought-after expert on…
Adam Meyers runs CrowdStrike's Global Threat Intelligence team and is responsible for creating actionable intelligence that enables customers to understand the who, what, and…
Disclaimer: CrowdStrike derived this information from investigations in non-classified environments. Since we value our client's privacy and interests, some data has been…
Disclaimer: CrowdStrike derived this information from investigations in non-classified environments. Since we value our clients’ privacy and interests, some data has been…
Disclaimer: CrowdStrike derived this information from investigations in non-classified environments. Since we value our client's privacy and interests, some data has been…