A Primer On Machine Learning In Endpoint Security

A Primer on Machine Learning in Endpoint Security

Although machine learning (ML) isn’t a new concept — it actually dates back to the origins of the computer itself…

READ MORE
What Causes IT Alert Fatigue And How To Avoid It

What Causes IT Alert Fatigue and How to Avoid It

A recent survey by the Cloud Security Alliance found, among other things, that out of a sampling of 2,542 anomalous…

READ MORE
Inside The Takedown Of ZOMBIE SPIDER And The Kelihos Botnet

Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet

This figure shows a snapshot of systems infected with Kelihos communicating with the sinkhole created to disable it. The arrest…

READ MORE
Securing The Mac-Based Organization

Securing the Mac-Based Organization

Though PCs still dominate the workplace, Macs continue to gain ground as the platform of choice for many organizations. As…

READ MORE
W-2 Phishing Scam Adds A New Twist To Wire Transfer Fraud

W-2 Phishing Scam Adds a New Twist to Wire Transfer Fraud

Organizations have long been aware of their vulnerability when it comes to email and yet phishing scams continue to be…

READ MORE
IDC MarketScape Names CrowdStrike Falcon® A “Leader” For Endpoint STAP

IDC MarketScape Names CrowdStrike Falcon® a “Leader” for Endpoint STAP

The IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of information and communications…

READ MORE
How To Manage Policies In Falcon

How to Manage Policies in Falcon

Introduction This post will cover some basic steps and concepts of managing policies in the Falcon Platform. It is often…

READ MORE
How Falcon And The “Power Of One” Eliminate System Tray Bloat [VIDEO]

How Falcon and the “Power of One” Eliminate System Tray Bloat [VIDEO]

A big concern for today’s IT executives is how to protect endpoints while avoiding “system tray bloat,” the condition that…

READ MORE
Understanding Indicators Of Attack (IOAs): The Power Of Event Stream Processing In CrowdStrike Falcon

Understanding Indicators of Attack (IOAs): The Power of Event Stream Processing in CrowdStrike Falcon

Event Stream Processing (ESP) has been a central component of CrowdStrike Falcon’s IOA approach since CrowdStrike's inception. In this post…

READ MORE
CrowdStrike Falcon Intelligence Receives SC Magazine Highest Recommendation And Rating

CrowdStrike Falcon Intelligence Receives SC Magazine Highest Recommendation and Rating

CrowdStrike Falcon™ Intelligence, powered by the CrowdStrike Global Intelligence Team, received top honors from SC Magazine with the highest possible rating…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo