How to Use CrowdStrike Dashboards
Introduction Security teams today work together to identify and defend against the massive number of cyberthreats out in the world…
How to Speed Investigations with Falcon Forensics
Introduction Threat hunters and incident responders are under tremendous time pressure to investigate breaches and incidents. While they are collecting…
How Falcon Horizon Secures Cloud Storage
Introduction As companies expand their use of public cloud infrastructure, human error and misconfigurations are increasingly at the root of…
From Intern to Software Engineer with Kenny Jue
Landing an internship in today’s uber-competitive job market can be a challenge, especially for those who want to work with…
How to Shrink Your SOC’s Response Time With Workflows and Real Time Response
As attack surfaces grow and threats become more sophisticated, your SOC team is challenged with detecting, understanding and containing an…
Two Sides of the Same Coin: Protecting Data in the Cloud Is a Shared Responsibility
In the era before cloud computing, enterprises could expect to be responsible for securing everything — the systems in the…
Austin Murphy, VP and GM of Falcon Complete, on Bringing the “Warrior Spirit” to Work
Battling the world’s most sophisticated digital adversaries requires dedication, tenacity, passion and talent — a collective skill set that Austin…
How Falcon Complete Analyst Alberto Reyes Navigated a Career Change From Client-Side Security to Cybersecurity Analyst
Alberto Reyes was working on a client-side security team when he was introduced to CrowdStrike. Somewhere along the way, he…
Falcon Complete Principal Analyst Hyemin Chung’s Tale of Exceptional Growth
Over the past two years, CrowdStrike’s Falcon Complete team grew tenfold, from about 20 people globally to nearly 200. One…
Falcon Complete Stops Microsoft Exchange Server Zero-Day Exploits
This week, Microsoft reported a rare cybersecurity event: an ongoing mass exploitation of Microsoft Exchange servers by an alleged state-sponsored…