Where To Find CrowdStrike At Black Hat 2015

Where to find CrowdStrike at Black Hat 2015

I can’t believe another year has passed and it is time for the annual pilgrimage to Vegas for Black Hat/Defcon.…

READ MORE
Falcon Zero-Day Flash Detection

Falcon Zero-Day Flash Detection

In the wake of the Hacking Team leaks in early July, a result of an intrusion into the company’s network,…

READ MORE
Google Capital Bets Big On CrowdStrike To Accelerate Hyper-growth

Google Capital Bets Big on CrowdStrike to Accelerate Hyper-growth

It was almost four years ago that I co-founded CrowdStrike with intention of creating an enduring security company that would…

READ MORE
Cloud-based Security: Future Of The Industry?

Cloud-based Security: Future of the Industry?

Alex Stamos, formerly with Yahoo and now CSO at Facebook, gave  a really interesting talk at AppSec California 2015 recently…

READ MORE
3 Core Principles Of Next-Generation Endpoint Protection

3 Core Principles of Next-Generation Endpoint Protection

Most organizations today focus on protecting their networks against malware, exploits, malicious websites, and unpatched vulnerabilities. Unfortunately, there is a…

READ MORE
Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

Five Steps to Incorporate Adversary Intelligence into Your Cybersecurity Program

With adversary focused threat intelligence, security professionals can proactively defend their enterprises and understand the details of the motivations, intent,…

READ MORE
Rhetoric Foreshadows Cyber Activity In The South China Sea

Rhetoric Foreshadows Cyber Activity in the South China Sea

As the increasingly aggressive rhetoric surrounding the conflict in the South China Sea (SCS) continues to dominate both Western and…

READ MORE
Avoiding The Cyber Security Blindside: Cardinal Innovation’s CIO Talks Endpoint Protection

Avoiding the Cyber Security Blindside: Cardinal Innovation’s CIO Talks Endpoint Protection

One of the greatest challenges faced by information security teams is how to protect your organization, your data, and your…

READ MORE
Is Your Cybersecurity Approach Based On Myth? Get A Reality Check.

Is Your Cybersecurity Approach Based on Myth? Get a Reality Check.

As human beings, we make thousands of assumptions every day. It is our way of coping with situations we do…

READ MORE
VENOM Vulnerability Details

VENOM Vulnerability Details

Recently, I discovered a vulnerability in QEMU's virtual Floppy Disk Controller (FDC), exploitation of which may allow malicious code inside…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo