How to Consume Threat Feeds
Introduction As part of the CrowdStrike API, the “Custom IOC APIs” allows you to retrieve, upload, update, search, and delete…
How to Integrate with your SIEM
Introduction The Falcon SIEM Connector provides users a turnkey, SIEM-consumable data stream. The Falcon SIEM Connector: Transforms Crowdstrike API data…
New Podcast Series: The Importance of Cyber Threat Intelligence in Cybersecurity
A new CrowdStrike® podcast series hosted by Cybercrime Magazine focuses on the critical role cyber threat intelligence (CTI) plays in…
Webcast: Unique Security Coalition Aims to Guide Work-From-Home Transition
CSOs, CISOs and security professionals everywhere are contending with a “new normal” due to the global pandemic. Employees are increasingly…
Prioritize Patching with Spotlight’s Exploited Vulnerabilities Feature
Introduction This document and video will demonstrate how to use Falcon Spotlight to find exploitable vulnerabilities in your environment to…
Debunking 3 Myths of Mentorship
This is the first blog in the “Women of CrowdStrike” blog series, a roundup of the latest tips, career advice…
Experts Insights From the Fal.Con 2020 Election Protection Panel
This eye-opening discussion exposes the real threats targeting global election processes and, more broadly, democracies around the world. Shawn Henry,…
CrowdStrike Pursues Higher Standards in Cloud Compliance To Better Protect Our Federal Customers
At CrowdStrike, our cloud-native protection is utilized by businesses ranging from small and mid-sized to the largest enterprises, as well…
The Critical Role of Cybersecurity in M&A: Part 1, Due Diligence
COVID-19 has disrupted virtually every aspect of business, and the mergers and acquisitions (M&A) pipeline is no exception. However, while…
WIZARD SPIDER Update: Resilient, Reactive and Resolute
WIZARD SPIDER is an established, high-profile and sophisticated eCrime group, originally known for the creation and operation of the TrickBot…