CrowdStrike’s First Fal.Con for Public Sector: State of the Threat and New Defense Strategies
The incredible success of the CrowdStrike annual Fal.Con cybersecurity conferences has led to a new Fal.Con event devoted exclusively to…
How Businesses Can Stay One Step Ahead of the Cybersecurity Hydra
In a recent interview conducted by TechRadar Pro, I shared my perspective on some of the key findings from the…
Gartner Report: Prepare for Endpoint Protection Shifting to the Cloud
“The endpoint protection market is undergoing its biggest transformation in the last 20 years.” — Gartner, the leading research and…
CSO Online: Insights on Cyber Espionage From CrowdStrike VP Mike Sentonas
An article on CSO India titled “Cyber Espionage Shows No Signs of Slowing Down,” by Soumik Gosh, presents CrowdStrike® VP…
Going Beyond Malware: The Rise of “Living off the Land” Attacks
This article was originally published on CSO, April 30, 2019 If you’re living off the land, there are a few…
CrowdStrike Falcon: First Endpoint Protection to Integrate Firmware Attack Detection Capability
Today’s endpoint security solutions have been designed primarily to look at the local operating system (OS) and the applications that…
When Tabletop Exercises Become Real-World Events
It happened again a couple months ago; an eerie sense of déjà vu as I read reports about suspected malware-enabled…
On-Demand Webcast Offers Recommendations for Closing the Cybersecurity Talent Gap
A CrowdStrike® on-demand webcast, presented by Product Marketing Director Jackie Castelli, examines the critical shortage organizations are facing as they…
Mac Attacks Along the Kill Chain: Credential Theft [VIDEO]
This blog is the third in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I…
On-Demand Webcast Discusses “Making 60-Minute Remediation a Reality”
A new on-demand webcast features CrowdStrike Vice President of Managed Services Austin Murphy, and Sr. Product Director Con Mallon as…