Solving Intractable Performance Problems Through Vertical Engineering

Solving Intractable Performance Problems Through Vertical Engineering

Owning the Image Object File Format, the Compiler Toolchain, and the Operating System As the Windows kernel continues to pursue…

READ MORE
State Of The Criminal Address

State of the Criminal Address

Over the past few months CrowdStrike has conducted several investigations in the hospitality, food services, and gaming industries, helping organizations…

READ MORE
The Power Of The Platform: Spring Release Extends The CrowdStrike Falcon Platform

The Power of The Platform: Spring Release Extends The CrowdStrike Falcon Platform

Many folks that track CrowdStrike’s progress are well aware that in 2015 we proudly announced that Google lead an investment…

READ MORE
Data Breach Prevention Using Proactive Hunting To Reveal Human Motive And Repel Targeted Attacks

Data Breach Prevention Using Proactive Hunting to Reveal Human Motive and Repel Targeted Attacks

CrowdStrike as an organization is utterly committed to stopping data breaches, and has spared no effort or expense in developing…

READ MORE
Bears In The Midst: Intrusion Into The Democratic National Committee

Bears in the Midst: Intrusion into the Democratic National Committee

Follow @CrowdStrike and @DAlperovitch for the latest on these threats   UPDATE: Below are some additional links to independent articles…

READ MORE
Making Breach Prevention Easier And Simpler

Making Breach Prevention Easier and Simpler

‘Simplicity is the ultimate sophistication’ These wise words are attributed to Clare Boothe Luce, an American congresswoman, ambassador, and playwright.…

READ MORE
Toolkit Helps Evaluate “Next Generation” Endpoint Protection Platforms

Toolkit Helps Evaluate “Next Generation” Endpoint Protection Platforms

A growing number of products in the marketplace tout themselves as being part of the “next generation” in endpoint protection.…

READ MORE
CrowdStrike’s New Methodology For Tracking ECrime

CrowdStrike’s New Methodology for Tracking eCrime

At our inception, CrowdStrike coined the phrase, “You don’t have a malware problem, you have an adversary problem.” Behind every…

READ MORE
How To Roll Out Your Own Threat Intelligence Team

How to Roll Out Your Own Threat Intelligence Team

Amidst a rapidly evolving threat landscape, many organizations are looking to integrate threat intelligence into their security operations but don’t…

READ MORE
Who Is FANCY BEAR?

Who is FANCY BEAR?

The nation-state adversary group known as FANCY BEAR has been operating since at least 2008 and represents a constant threat…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo