Reconnaissance Detection (Blue Team)

Reconnaissance Detection (Blue Team)

As we move through this Red Team vs. Blue Team series, our intent is to provide insight into both sides…

READ MORE
Open Source Active Reconnaissance (Red Team)

Open Source Active Reconnaissance (Red Team)

With the current threat landscape and likelihood of targeted attacks, organizations are dealing with myriad attempts to breach their network…

READ MORE
Moving Beyond Indicators Of Compromise (IOCs)

Moving beyond Indicators of Compromise (IOCs)

For the last few years, the security industry has become very enamored with Indicators of Compromise (IOCs) as a way to…

READ MORE
Using OS X FSEvents To Discover Deleted Malicious Artifacts

Using OS X FSEvents to Discover Deleted Malicious Artifacts

File System Events (FSEvents) in OS X 10.7+ introduced the capability to monitor changes to a directory. FSevents are logged…

READ MORE
The Security Partner Ecosystem In A Cloudy World

The Security Partner Ecosystem in a Cloudy World

I get excited when I see any technology that is built on a core platform that enables customers and partners…

READ MORE
Are You More Interested In Stopping A Breach Or Stopping Malware?

Are You More Interested in Stopping a Breach or Stopping Malware?

This is a question I ask a lot of organizations that I speak with. While the obvious answer should be…

READ MORE
Can’t Protect Your Data From Ransomware? Think Again.

Can’t Protect Your Data from Ransomware? Think Again.

Read Video Transcript All too often, I hear from executives of large and small organizations that aside from targeted attacks,…

READ MORE
CrowdStrike Winter Release: What The !@#$ Is Next-generation?

CrowdStrike Winter Release: What the !@#$ is next-generation?

I’d love to tell you about all the cool stuff in our Falcon platform winter release. It represents a huge…

READ MORE
Investigating PowerShell: Command And Script Logging

Investigating PowerShell: Command and Script Logging

PowerShell is becoming ubiquitous in the Microsoft ecosystem, and, while it simplifies administration, it opens up a nearly unprecedented suite…

READ MORE
It Takes A Village To Manage Cyber Risks

It Takes a Village to Manage Cyber Risks

CrowdStrike Services regularly helps companies develop strategies for identifying and responding to cybersecurity incidents. Too often, we encounter companies whose…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo