CrowdStrike’s 2015 Global Threat Report: Intelligence For The Business

CrowdStrike’s 2015 Global Threat Report: Intelligence for the Business

Over the past several years an increasing number of organizations have turned to threat intelligence to counter the aggressions of…

READ MORE
The 2015 Global Threat Report: The Paradigm Shifts- People, Process, Technology, AND Intelligence

The 2015 Global Threat Report: The Paradigm Shifts- People, Process, Technology, AND Intelligence

If there’s one thing that businesses, boards of directors and C-level execs can take from CrowdStrike’s 2015 Threat Report, is…

READ MORE
2015 CrowdStrike Global Threat Report Preview

2015 CrowdStrike Global Threat Report Preview

With every year that passes, the stakes for connecting a business to the Internet dramatically increase. In 2013, the use…

READ MORE
4.0 Another Brick In The CryptoWall

4.0 Another Brick In The CryptoWall

Introduction For as long as there have been people using the World Wide Web, criminal groups have tried to extort…

READ MORE
The Security Roadmap – Planning For Job Security

The Security Roadmap – Planning for Job Security

In my previous blog post titled “’You Want Me to Do What?’ A Guide to Interpreting Cybersecurity Recommendations”, we discussed…

READ MORE
More Than Just Your ESignature: The Analysis

More Than Just Your eSignature: The Analysis

CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…

READ MORE
More Than Just Your ESignature

More than just your eSignature

CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…

READ MORE
Next Gen Penetration Testing: An Adversarial Approach

Next Gen Penetration Testing: An Adversarial Approach

In today’s dynamic security world, organizations must understand the benefits of proactively testing their cyber security posture to properly defend…

READ MORE
The Importance Of Logs

The Importance of Logs

Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear:…

READ MORE
Compromise Attack Targets: Corporate Printers?

Compromise Attack Targets: Corporate Printers?

The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo