Defeating Adversaries Requires A Proactive Cybersecurity Strategy

Defeating Adversaries Requires a Proactive Cybersecurity Strategy

“Hope is not a strategy.” While blunt in delivery, the message implied in Vince Lombardi’s famous saying is simple: to…

READ MORE
Multi-Layered Prevention For The Endpoint

Multi-Layered Prevention for the Endpoint

Benjamin Franklin wisely stated that, “An ounce of prevention is worth a pound of cure.” In keeping with this timeless…

READ MORE
Shamoon Round 2 Or The Power Of Machine Learning

Shamoon Round 2 or the Power of Machine Learning

On August 15, 2012, a significantly destructive wiper called Shamoon was unleashed by suspected Iranian adversaries on several energy companies…

READ MORE
Critical Infrastructure: One More Thing To Give Thanks For — And Protect

Critical Infrastructure: One More Thing to Give Thanks For — and Protect

November 2016 has been proclaimed Critical Infrastructure Security and Resilience Month.   This is an annual effort, beginning this year, to…

READ MORE
‘Tis The Season For Account Thievin’

‘Tis the Season for Account Thievin’

Brooklyn born Willie Sutton made a career in crime; robbing banks and jewelry stores often in disguise earning him the…

READ MORE
CrowdStrike Falcon Certified As Legacy AV Replacement

CrowdStrike Falcon Certified as Legacy AV Replacement

We started CrowdStrike five years ago with the mission to revolutionize endpoint security. At that time, no one was talking…

READ MORE
CrowdStrike And NIST 800-53: Now That’s What I Call A “Twofer”

CrowdStrike and NIST 800-53: Now That’s What I Call a “Twofer”

“Twofer” has entered into the lexicon of everyday use. The Urban Dictionary defines it as the opportunity to receive the…

READ MORE
Adversary Tricks And CrowdStrike Treats: 2016 Halloween And AtomBombing Edition

Adversary Tricks and CrowdStrike Treats: 2016 Halloween and AtomBombing Edition

Yet another season for trick-or-treating is upon us, and just like I did last year, I wanted to share some…

READ MORE
Uncle Sam Gets An Incident Response Plan

Uncle Sam Gets an Incident Response Plan

Once upon a time,  when presidential politics were more sedate, the leader of the free world quipped that the nine…

READ MORE
The Three Steps Of Proactive Threat Hunting

The Three Steps of Proactive Threat Hunting

Security teams in the private and public sector are increasingly recognizing the need to actively “hunt” for threats targeting their…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial