Mergers And Acquisitions: Cybersecurity Due Diligence

Mergers and Acquisitions: Cybersecurity Due Diligence

The year 2015 marked the highest ever value of mergers & acquisitions with an astounding $4.6 trillion.  If 2016 follows…

READ MORE
M&A – Buying While Cyber Blind?

M&A – Buying While Cyber Blind?

Mergers and acquisitions: Many organizations utilize these activities to move their business forward by expanding into different market segments or…

READ MORE
Cyber Skirmish: Russia V. Turkey

Cyber Skirmish: Russia v. Turkey

On the morning of 24 November 2015 an F-16 operated by the Turkish Air Force dropped into position behind a…

READ MORE
How “Next-Gen” Is Your Endpoint Protection?

How “Next-Gen” is your endpoint protection?

Join Dmitri Alperovitch, CrowdStrike’s Co-founder and CTO and Forrester’s Jeff Pollard for a Crowdcast on April 27th on new approaches…

READ MORE
Reconnaissance Detection (Blue Team)

Reconnaissance Detection (Blue Team)

As we move through this Red Team vs. Blue Team series, our intent is to provide insight into both sides…

READ MORE
Open Source Active Reconnaissance (Red Team)

Open Source Active Reconnaissance (Red Team)

With the current threat landscape and likelihood of targeted attacks, organizations are dealing with myriad attempts to breach their network…

READ MORE
Moving Beyond Indicators Of Compromise (IOCs)

Moving beyond Indicators of Compromise (IOCs)

For the last few years, the security industry has become very enamored with Indicators of Compromise (IOCs) as a way to…

READ MORE
Using OS X FSEvents To Discover Deleted Malicious Artifacts

Using OS X FSEvents to Discover Deleted Malicious Artifacts

File System Events (FSEvents) in OS X 10.7+ introduced the capability to monitor changes to a directory. FSevents are logged…

READ MORE
The Security Partner Ecosystem In A Cloudy World

The Security Partner Ecosystem in a Cloudy World

I get excited when I see any technology that is built on a core platform that enables customers and partners…

READ MORE
Are You More Interested In Stopping A Breach Or Stopping Malware?

Are You More Interested in Stopping a Breach or Stopping Malware?

This is a question I ask a lot of organizations that I speak with. While the obvious answer should be…

READ MORE
 

Stop Breaches with CrowdStrike Falcon Request A Demo