CrowdStrike CEO: Pandemic Fuels Digital and Security Transformation Trends
Acknowledging both the “staggering” changes security pros continue to face because of the pandemic, and their hard work during “exhausting,…
Testing the Untestable in Java
This blog is primarily aimed at software development engineers in test (SDETs) who are testing Java applications, specifically focusing on…
CrowdStrike Falcon Supports New macOS Big Sur
This year, Apple announced a major overhaul of macOS calling it “the biggest update to design in more than a…
Hacking Farm to Table: Threat Hunters Uncover Rise in Attacks Against Agriculture
Life on the farm isn’t what it used to be. With overall cyberattacks on the rise, even agriculture has found…
CrowdStrike Integrated Intelligence and Deployment Automation Enhance New AWS Network Firewall
CrowdStrike is thrilled to be attending the AWS re:Invent 2020 virtual event as an AWS Partner Network (APN) sponsor and…
2020 Global Security Attitude Survey: How Organizations Fear Cyberattacks Will Impact Their Digital Transformation and Future Growth
Senior IT and security decision-makers around the world are concerned that the global pandemic and rapid adoption of a work-from-anywhere…
The Critical Role of Cybersecurity in M&A: Part 3, Post-Close
In the post-close phase of an M&A transaction, the deal may be done but the job of integration has just…
Blind Spots in the Cloud
Visibility in the cloud is an important but difficult problem to tackle. It differs among cloud providers, and each one…
The Critical Role of Cybersecurity in M&A: Part 2, Pre-Close
This is Part 2 of our three-part blog series on the critical importance of cybersecurity in the M&A process. Part…
Seeing Malware Through the Eyes of a Convolutional Neural Network
Motivation Deep learning models have been considered “black boxes” in the past, due to the lack of interpretability they were…