X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Beware: Third Parties Can Undermine Your Security

Beware: Third Parties Can Undermine Your Security

Do you automatically trust your external vendors? You might want to make them earn your trust. Adversaries are constantly seeking…

READ MORE
How To Manage A Host Firewall With CrowdStrike

How to Manage a Host Firewall with CrowdStrike

Introduction This document and video will demonstrate how CrowdStrike can manage the native OS host firewall. Through the existing agent…

READ MORE
The CrowdStrike 2020 Global Threat Report Reveals Troubling Advances In Cybercrime

The CrowdStrike 2020 Global Threat Report Reveals Troubling Advances in Cybercrime

Those of us who have worked in cybersecurity for many years often start to think we’ve “seen it all.” We…

READ MORE
At RSA 2020, CrowdStrike Wins SC Media Excellence Award For Best Security Company

At RSA 2020, CrowdStrike Wins SC Media Excellence Award for Best Security Company

RSA 2020 has proven to be another breakthrough event for CrowdStrike®, including highlights such as winning the SC Media 2020…

READ MORE
CrowdStrike Unveils Exciting New Capabilities At RSA 2020

CrowdStrike Unveils Exciting New Capabilities at RSA 2020

It’s that time of the year, and the RSA 2020 conference is proving to be as ambitious and jam-packed as…

READ MORE
CrowdStrike’s Matt LeMiere On Why Schools Are Failing Cybersecurity

CrowdStrike’s Matt LeMiere on Why Schools Are Failing Cybersecurity

Cybercriminals have long considered schools a soft target and a recent article on GovCybersecurityHub explores the reasons why and what…

READ MORE
Convolutional Neural Networks Are MALE Models For PE Malware

Convolutional Neural Networks Are MALE Models for PE Malware

Machine learning for computer security has enjoyed a number of recent successes, but these tools aren’t perfect, and sometimes a…

READ MORE
How To Sniff Out (and Block) BloodHound Attacks

How to Sniff Out (and Block) BloodHound Attacks

The growing adversary focus on “big game hunting” (BGH) in ransomware attacks — targeting organizations and data that offer a higher…

READ MORE
Building A String-Based Machine Learning Model To Detect Malicious Activity

Building a String-Based Machine Learning Model to Detect Malicious Activity

Working with text data (which we often refer to as “strings”) is common in cybersecurity applications. For example, suppose we…

READ MORE
Gimme Shellter

Gimme Shellter

Red team penetration testers very often add tools to their arsenal that borrow techniques originating in malicious software. Shellter is…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial