There is nothing more important than your health
It’s a common saying, and who would argue against it? The majority of us take our health very seriously. Our…
Who Is COZY BEAR (APT 29)?
The sophisticated threat actor COZY BEAR was initially identified in 2014. This actor has many other names in the information…
CrowdStrike’s New Methodology for Tracking eCrime
At our inception, CrowdStrike coined the phrase, “You don’t have a malware problem, you have an adversary problem.” Behind every…
Toolkit Helps Evaluate “Next Generation” Endpoint Protection Platforms
A growing number of products in the marketplace tout themselves as being part of the “next generation” in endpoint protection.…
State of the Criminal Address
Over the past few months CrowdStrike has conducted several investigations in the hospitality, food services, and gaming industries, helping organizations…
Solving Intractable Performance Problems Through Vertical Engineering
Owning the Image Object File Format, the Compiler Toolchain, and the Operating System As the Windows kernel continues to pursue…
5 Common Mistakes to Avoid in Cyber Incident Response
Network intrusions have become a fact of corporate life, and increasingly are viewed as among the many costs of doing…
Mergers and Acquisitions: Cybersecurity Due Diligence
The year 2015 marked the highest ever value of mergers & acquisitions with an astounding $4.6 trillion. If 2016 follows…
M&A – Buying While Cyber Blind?
Mergers and acquisitions: Many organizations utilize these activities to move their business forward by expanding into different market segments or…
Cyber Skirmish: Russia v. Turkey
On the morning of 24 November 2015 an F-16 operated by the Turkish Air Force dropped into position behind a…