RECENT ARTICLES

The Critical Role Of Cybersecurity In M&A: Part 3, Post-Close

The Critical Role of Cybersecurity in M&A: Part 3, Post-Close

In the post-close phase of an M&A transaction, the deal may be done but the job of integration has just…

READ MORE
Blind Spots In The Cloud

Blind Spots in the Cloud

Visibility in the cloud is an important but difficult problem to tackle. It differs among cloud providers, and each one…

READ MORE
Scott Hasson, Security Services Specialist On Protecting The Digital World

Scott Hasson, Security Services Specialist on Protecting the Digital World

As a former member of the British Armed Forces, protecting people is what Scott Hasson has always done. Lucky for…

READ MORE
How CrowdStrike Provides Visibility For Cloud Security

How CrowdStrike Provides Visibility for Cloud Security

Introduction With the rapid adoption of cloud deployments, many organizations are struggling to implement consistent security standards. This document and…

READ MORE
Learning How To Problem-Solve At Scale And Embrace A World Of Continuous Change With Morgan Maxwell, Senior Engineer

Learning How to Problem-Solve at Scale and Embrace a World of Continuous Change with Morgan Maxwell, Senior Engineer

At CrowdStrike, we sometimes like to say, “There’s data, big data and CrowdStrike data,” by which we mean our engineers…

READ MORE
A Behind-the-Scenes Look At The Life Of A CrowdStrike Engineer With Sorabh Lall, Senior Engineer

A Behind-the-Scenes Look at the Life of a CrowdStrike Engineer with Sorabh Lall, Senior Engineer

Cybersecurity is all about anomalies — and perhaps no one can prove that point better than Sorabh Lall. As a…

READ MORE
The Critical Role Of Cybersecurity In M&A: Part 2, Pre-Close

The Critical Role of Cybersecurity in M&A: Part 2, Pre-Close

This is Part 2 of our three-part blog series on the critical importance of cybersecurity in the M&A process. Part…

READ MORE
Offering Our People Autonomy, Mastery And Purpose: Patrick McCormack, SVP Cloud Engineering

Offering Our People Autonomy, Mastery and Purpose: Patrick McCormack, SVP Cloud Engineering

When deciding to take a new job, one of the biggest concerns is often who you’ll be working for —…

READ MORE
Seeing Malware Through The Eyes Of A Convolutional Neural Network

Seeing Malware Through the Eyes of a Convolutional Neural Network

Motivation Deep learning models have been considered “black boxes” in the past, due to the lack of interpretability they were…

READ MORE
How To Enable Kernel Exploit Prevention

How to Enable Kernel Exploit Prevention

Introduction This document and video will demonstrate how to enable kernel exploit prevention to protect hosts from sophisticated attacks that…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial