X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Adversary Extends Persistence By Modifying System Binaries

Adversary Extends Persistence by Modifying System Binaries

At the end of September 2018, the CrowdStrike® Falcon OverWatch™ team identified suspicious interactive activity on a Linux host within…

READ MORE
How To Gain Full PowerShell Visibility With CrowdStrike Falcon

How to Gain Full PowerShell Visibility with CrowdStrike Falcon

Introduction PowerShell visibility is a necessity when investigating today's threats.  CrowdStrike provides the most comprehensive solution to detect, discover, and…

READ MORE
How To Generate Your First Detection

How to Generate Your First Detection

Introduction In this document and video, you'll see how to generate your first detection.  You will also see how Falcon…

READ MORE
Confessions Of A Responder: The Hardest Part Of Incident Response Investigations

Confessions of a Responder: The Hardest Part of Incident Response Investigations

It’s not the disk forensics. It’s not the log analysis. It’s not even the lawyers (we love working with law…

READ MORE
Big Data, Graph, And The Cloud: Three Keys To Stopping Today’s Threats

Big Data, Graph, and the Cloud: Three Keys to Stopping Today’s Threats

An edited version of this blog was published as an article in Teiss on December 12, 2018. Graph databases are…

READ MORE
MITRE ATT&CK: Why Detections And Tainted Telemetry Are Required For An Effective EDR Solution

MITRE ATT&CK: Why Detections and Tainted Telemetry are Required for an Effective EDR Solution

Following the MITRE ATT&CK™ Evaluation of endpoint detection and response (EDR) solutions, I've heard a lot of confusion surrounding the…

READ MORE
Article Stresses The Need For Strong Cybersecurity Governance At All Points In The Investment Chain

Article Stresses The Need For Strong Cybersecurity Governance at All Points in The Investment Chain

This article is republished by permission and is an excerpt from White & Case Private Equity Viewpoint magazine, Issue #2:…

READ MORE
The CrowdStrike Services Cyber Intrusion Casebook 2018 Offers Compelling Stories From The Front Lines Of Incident Response

The CrowdStrike Services Cyber Intrusion Casebook 2018 Offers Compelling Stories from the Front Lines of Incident Response

Download The CrowdStrike Services Cyber Intrusion Casebook 2018 In the last few years, the cybersecurity world has seen a rise…

READ MORE
CrowdStrike CTO’s Senate Testimony On Countering Nation-State Cyberattacks — Part 3: The “1-10-60” Rule

CrowdStrike CTO’s Senate Testimony on Countering Nation-State Cyberattacks — Part 3: The “1-10-60” Rule

This is the third and final blog in a series presenting the testimony I gave on Nov. 14, 2018, before…

READ MORE
MITRE ATT&CK Evaluation Reveals CrowdStrike Falcon As The Most Effective EDR Solution

MITRE ATT&CK Evaluation Reveals CrowdStrike Falcon as the Most Effective EDR Solution

CrowdStrike delivers the most proactive detections, visibility, and context in MITRE ATT&CK™ Evaluation testing. At CrowdStrike, we believe strongly in…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial