Compromise Attack Targets: Corporate Printers?

Compromise Attack Targets: Corporate Printers?

The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude…

READ MORE
What Sets Falcon Apart: Intelligent Host Sensors

What Sets Falcon Apart: Intelligent Host Sensors

It can be difficult to distinguish between “next-generation” endpoint security solutions currently available.  Usually the technology lags marketing by a…

READ MORE
New Protection Capability Of Falcon For Mac: Improving Security With SUIDGuard

New Protection Capability of Falcon for Mac: Improving Security With SUIDGuard

A comprehensive Next-Generation Endpoint Protection strategy shouldn’t just be about reacting and responding to threats, but also be complemented by…

READ MORE
“You Want Me To Do What?” A Guide To Interpreting Cybersecurity Recommendations

“You Want Me to Do What?” A Guide to Interpreting Cybersecurity Recommendations

Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is…

READ MORE
Top 5 Cybersecurity Mistakes Companies Make And How To Avoid Them

Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them

Cybersecurity requires a holistic organizational approach. From the leadership to each rank-and-file employee, a concerted effort must be maintained to…

READ MORE
Nothing Else Is Working. Why Not Memory Forensics?

Nothing else is working. Why not memory forensics?

I ran across a couple of blog posts recently that were espousing the virtues of memory forensics.  Having developed a…

READ MORE
Sakula Reloaded

Sakula Reloaded

Often during the investigation of sophisticated threat actors, the demarcation between the different attackers and campaigns are blurry. Researchers need…

READ MORE
7 Key Steps To Improve Your Network Defenses

7 Key Steps to Improve Your Network Defenses

In an age where information is the ultimate currency, traditional strategies focused on malware, perimeter defense, detection of malicious websites…

READ MORE
The Imperative For Proactive Incident Response In 2015 And Beyond

The Imperative for Proactive Incident Response in 2015 and Beyond

Today, the CrowdStrike Services team is unveiling its first-ever Cyber Intrusion Casebook. In this report, we highlight findings from hundreds…

READ MORE
Why Your Business Environment Should Drive Cybersecurity

Why Your Business Environment Should Drive Cybersecurity

This is the second in a recurring series that explores the cybersecurity principles and best practices found within the National…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo