RECENT ARTICLES

How To Consume Threat Feeds

How to Consume Threat Feeds

Introduction As part of the CrowdStrike API, the “Custom IOC APIs” allows you to retrieve, upload, update, search, and delete…

READ MORE
How To Integrate With Your SIEM

How to Integrate with your SIEM

Introduction The Falcon SIEM Connector provides users a turnkey, SIEM-consumable data stream. The Falcon SIEM Connector: Transforms Crowdstrike API data…

READ MORE
New Podcast Series: The Importance Of Cyber Threat Intelligence In Cybersecurity

New Podcast Series: The Importance of Cyber Threat Intelligence in Cybersecurity

A new CrowdStrike® podcast series hosted by Cybercrime Magazine focuses on the critical role cyber threat intelligence (CTI) plays in…

READ MORE
Webcast: Unique Security Coalition Aims To Guide Work-From-Home Transition

Webcast: Unique Security Coalition Aims to Guide Work-From-Home Transition

CSOs, CISOs and security professionals everywhere are contending with a “new normal” due to the global pandemic. Employees are increasingly…

READ MORE
Prioritize Patching With Spotlight’s Exploited Vulnerabilities Feature

Prioritize Patching with Spotlight’s Exploited Vulnerabilities Feature

Introduction This document and video will demonstrate how to use Falcon Spotlight to find exploitable vulnerabilities in your environment to…

READ MORE
Debunking 3 Myths Of Mentorship

Debunking 3 Myths of Mentorship

This is the first blog in the “Women of CrowdStrike” blog series, a roundup of the latest tips, career advice…

READ MORE
Experts Insights From The Fal.Con 2020 Election Protection Panel

Experts Insights From the Fal.Con 2020 Election Protection Panel

This eye-opening discussion exposes the real threats targeting global election processes and, more broadly, democracies around the world. Shawn Henry,…

READ MORE
CrowdStrike Pursues Higher Standards In Cloud Compliance To Better Protect Our Federal Customers

CrowdStrike Pursues Higher Standards in Cloud Compliance To Better Protect Our Federal Customers

At CrowdStrike, our cloud-native protection is utilized by businesses ranging from small and mid-sized to the largest enterprises, as well…

READ MORE
The Critical Role Of Cybersecurity In M&A: Part 1, Due Diligence

The Critical Role of Cybersecurity in M&A: Part 1, Due Diligence

COVID-19 has disrupted virtually every aspect of business, and the mergers and acquisitions (M&A) pipeline is no exception. However, while…

READ MORE
WIZARD SPIDER Update: Resilient, Reactive And Resolute

WIZARD SPIDER Update: Resilient, Reactive and Resolute

WIZARD SPIDER is an established, high-profile and sophisticated eCrime group, originally known for the creation and operation of the TrickBot…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial