Three Must-Haves For Future-Proofing Your SOC

Three Must-Haves for Future-Proofing Your SOC

An article in InfoTech by CrowdStrike CISO Jerry Dixon, “How to Future-proof Your Security Operations,” explains the dilemma that many…

READ MORE
Why IT Hygiene Is Critical To Your Cybersecurity Readiness

Why IT Hygiene is Critical to Your Cybersecurity Readiness

Decluttering Your IT “Desk” There is an old adage that claims “a messy desk is the sign of genius.” Although…

READ MORE
Stopping Cyber “Shakedowns” — How To Protect Against Extortion-Based ECrime

Stopping Cyber “Shakedowns” — How to Protect Against Extortion-Based eCrime

Internet extortion and “datanapping” have become common occurrences, with increasingly high-profile victims ranging from hospitals to Hollywood studios. A new…

READ MORE
Defining The Value Of Machine Learning For Endpoint Protection

Defining the Value of Machine Learning for Endpoint Protection

Computer Business Review recently published an interview with CrowdStrike® Chief Scientist Dr. Sven Krasser, “Machine learning in cybersecurity: The first…

READ MORE
Risk Vs. Reward: Cybersecurity In Modern Manufacturing Environments

Risk vs. Reward: Cybersecurity in Modern Manufacturing Environments

The technology advancements available to modern manufacturers have been welcomed by the industry with open arms because of their ability…

READ MORE
CrowdStrike Protects Against NotPetya Attack

CrowdStrike Protects Against NotPetya Attack

Update: Due to naming convention consistency in the industry, CrowdStrike is now calling this variant of Petya - NotPetya. On…

READ MORE
CrowdStrike CEO And Co-founder George Kurtz Wins Ernst & Young Entrepreneur Of The Year For Security

CrowdStrike CEO and Co-founder George Kurtz Wins Ernst & Young Entrepreneur of the Year for Security

CrowdStrike®  added a prestigious award to its many achievements when CEO and co-founder, George Kurtz, was named Ernst & Young…

READ MORE
NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft

NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft

Update: Due to naming convention consistency in the industry, CrowdStrike is now calling this variant of Petya - NotPetya. Executive…

READ MORE
NotPetya Technical Analysis Part II: Further Findings And Potential For MBR Recovery

NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery

Update: Due to naming convention consistency in the industry, CrowdStrike is now calling this variant of Petya - NotPetya. Executive…

READ MORE
When Worlds Collide: The Impact Of Cyber Threats Crossing Over To The Physical World

When Worlds Collide: The Impact of Cyber Threats Crossing Over to the Physical World

A recent article in Information Age, titled  “As the digital and physical worlds collide it’s time for a security refresh,”…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo