Achieving Cybersecurity Effectiveness In A World Of Advanced Threats

Achieving Cybersecurity Effectiveness in a World of Advanced Threats

CrowdStrike CEO and co-founder George Kurtz was featured In a recent Forbes article, Security Advice from the CEO of the…

Visit CrowdStrike At Black Hat 2017

Visit CrowdStrike at Black Hat 2017

This year marks a 20-year milestone for Black Hat, one of the cybersecurity industry’s signature events. Originally an offshoot of…

Webcast Unpacks Fileless Attacks And Explains What It Takes To Fight Them

Webcast Unpacks Fileless Attacks and Explains What it Takes to Fight Them

A new webcast, “Understanding Fileless Attacks and How to Stop Them,” explains the rise in fileless attacks and why this…

CrowdStrike Summer Release 2017: Falcon Search Engine Brings Speed And Agility To Cybersecurity

CrowdStrike Summer Release 2017: Falcon Search Engine Brings Speed and Agility to Cybersecurity

Today we are proud to announce the CrowdStrike Falcon® Search Engine, the largest and fastest search engine exclusively for cybersecurity…

Four Steps To Choosing The Right Antivirus Replacement

Four Steps to Choosing the Right Antivirus Replacement

Few security experts would dispute the fact that legacy antivirus (AV) solutions are no match for today’s most stealthy and…

CrowdStrike Falcon Endpoint Protection Receives Five Stars Across The Board In SC Magazine Evaluation

CrowdStrike Falcon Endpoint Protection Receives Five Stars Across the Board in SC Magazine Evaluation

The CrowdStrike Falcon platform recently participated in a group evaluation by SC Magazine’s testing team, a U.S.-based team that includes…

Decrypting NotPetya/Petya: Tools For Recovering Your MFT After An Attack

Decrypting NotPetya/Petya: Tools for Recovering Your MFT After an Attack

Making the world a better place has always been a core goal of CrowdStrike. In this blog post, we are…

New York State Cybersecurity Regulations For Financial Institutions Are Tough, Critical, And Reach Beyond State Borders

New York State Cybersecurity Regulations for Financial Institutions are Tough, Critical, and Reach Beyond State Borders

Given today’s global cyber threatscape, the increased amount of targeted attacks against the financial sector — and New York City’s…

Address Zero-Day Threats Long Before An Attack Occurs

Address Zero-Day Threats Long Before an Attack Occurs

A recent interview with CrowdStrike VP of Product Marketing Dan Larson, for the CyberWire Daily Podcast, focuses on “zero-day” attacks…

Webcast Offers Critical Factors For Effective Endpoint Detection And Response (EDR)

Webcast Offers Critical Factors for Effective Endpoint Detection and Response (EDR)

In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris…


Try CrowdStrike Free for 15 Days Get Started with A Free Trial