CrowdStrike Winter Release: What the !@#$ is next-generation?
I’d love to tell you about all the cool stuff in our Falcon platform winter release. It represents a huge…
Can’t Protect Your Data from Ransomware? Think Again.
Read Video Transcript All too often, I hear from executives of large and small organizations that aside from targeted attacks,…
Are You More Interested in Stopping a Breach or Stopping Malware?
This is a question I ask a lot of organizations that I speak with. While the obvious answer should be…
The Security Partner Ecosystem in a Cloudy World
I get excited when I see any technology that is built on a core platform that enables customers and partners…
Open Source Active Reconnaissance (Red Team)
With the current threat landscape and likelihood of targeted attacks, organizations are dealing with myriad attempts to breach their network…
Reconnaissance Detection (Blue Team)
As we move through this Red Team vs. Blue Team series, our intent is to provide insight into both sides…
Cyber Skirmish: Russia v. Turkey
On the morning of 24 November 2015 an F-16 operated by the Turkish Air Force dropped into position behind a…
M&A – Buying While Cyber Blind?
Mergers and acquisitions: Many organizations utilize these activities to move their business forward by expanding into different market segments or…
Mergers and Acquisitions: Cybersecurity Due Diligence
The year 2015 marked the highest ever value of mergers & acquisitions with an astounding $4.6 trillion. If 2016 follows…
5 Common Mistakes to Avoid in Cyber Incident Response
Network intrusions have become a fact of corporate life, and increasingly are viewed as among the many costs of doing…