Start Your Fal.Con 2020 Experience
Fal.Con 2020 is almost here, and the Fal.Con 2020 virtual experience has already started! You can now log in to…
Modern Infrastructure Requires Modern Cloud Security
Built in the cloud and for the cloud, cloud-native applications are driving digital transformation and creating new opportunities to increase…
Clarity in the Cloud: See More, Know More, Do More With Falcon Horizon
The adoption of the cloud has fundamentally changed the game when it comes to how businesses go to market and…
Celebrating National Hispanic Heritage Month Through History
When I thought about what Hispanic Heritage Month meant to me and what I would recommend others reflect on during…
CrowdStrike Falcon Named Best EDR by SE Labs, Delivering 100% Detection, 0% Noise
Proving safety is challenging in any industry, whether you’re talking about automobiles, baby furniture or protective helmets. It requires special…
Successful Threat Hunting Starts with a SEARCH
Threat hunting is the discipline of employing human analysts to actively search for and disrupt distinctly human threats. It leverages…
Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2
This blog is Part 2 of a three-part blog series detailing the reemergence and evolution of QakBot in the spring…
Double Trouble: Ransomware with Data Leak Extortion, Part 2
As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various…
How Principal Writer Elly Searle Makes the Highly Technical Seem Completely Human
Elly Searle is a champion of user experience, a behind-the-scenes engineer, a client mentor and a technical translator. She is…
Duck Hunting with Falcon Complete: Analyzing a Fowl Banking Trojan, Part 1
Adversaries constantly develop new tactics that enhance their capabilities to deploy malware across networked environments and monetize infected systems. This…