FEATURED ARTICLES

Falcon Complete And CrowdStrike Adversary Emulation Pen Testing Recognized As “Cyber Catalysts” In Marsh Cyber Risk Evaluation

Falcon Complete and CrowdStrike Adversary Emulation Pen Testing Recognized as “Cyber Catalysts” in Marsh Cyber Risk Evaluation

Marsh, one of the world’s leading insurance broker and risk adviser, has named CrowdStrike® as a recipient of its first-ever…

READ MORE
How CrowdStrike Uses SHAP To Enhance Machine Learning Models

How CrowdStrike Uses SHAP to Enhance Machine Learning Models

At CrowdStrike®, machine learning is a major tool for detecting new malware families and keeping our customers safe. We utilize…

READ MORE
Saved By The Shell: Reconstructing Command-Line Activity On MacOS

Saved by the Shell: Reconstructing Command-Line Activity on MacOS

In Mac OSX Lion (10.7), Apple introduced a feature called “User Interface (UI) Preservation”, intended to save the state of…

READ MORE
Falcon OverWatch Threat Hunting Report Finds An Increase In ECrime As Adversaries Mature Their Skills

Falcon OverWatch Threat Hunting Report Finds an Increase in eCrime as Adversaries Mature Their Skills

The CrowdStrike® Falcon OverWatch™ elite threat hunting team has released a new report, The 2019 OverWatch Mid-Year Report: Observations from…

READ MORE
CrowdStrike Named A Leader In The 2019 Forrester Wave For Endpoint Security Suites

CrowdStrike Named a Leader in the 2019 Forrester Wave for Endpoint Security Suites

CrowdStrike secures the highest possible score in seventeen criteria and the top score overall in the strategy category. “CrowdStrike has…

READ MORE
Video: How CrowdStrike’s Vision Redefined Endpoint Security

Video: How CrowdStrike’s Vision Redefined Endpoint Security

The CrowdStrike® “Vision” video features Co-founders George Kurtz, CEO, and Dmitri Alperovitch, CTO, offering a look at the driving forces…

READ MORE
CrowdStrike Store’s New Dragos App Provides Early Visibility Of OT Threats Across IT Environments

CrowdStrike Store’s New Dragos App Provides Early Visibility of OT Threats Across IT Environments

Traditionally, information technology (IT) and operational technology (OT) environments have been separate, with their networking and security requirements managed by…

READ MORE
Ransomware Increases The Back-to-School Blues

Ransomware Increases the Back-to-School Blues

As students all over the United States donned their backpacks and packed their lunches to go back to school this…

READ MORE
Using Docker To Do Machine Learning At Scale

Using Docker to Do Machine Learning at Scale

One key building block we use for scaling our machine learning models at CrowdStrike® is Docker containers. Docker containers let…

READ MORE
Who Is Salty Spider (Sality)?

Who is Salty Spider (Sality)?

Common Aliases SALTY SIDER is most commonly identified with the botnet it maintains (Sality) and it’s associated pseudonyms:  KuKu SalLoad…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial