More Than Just Your ESignature

More than just your eSignature

CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…

READ MORE
Next Gen Penetration Testing: An Adversarial Approach

Next Gen Penetration Testing: An Adversarial Approach

In today’s dynamic security world, organizations must understand the benefits of proactively testing their cyber security posture to properly defend…

READ MORE
The Importance Of Logs

The Importance of Logs

Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear:…

READ MORE
Compromise Attack Targets: Corporate Printers?

Compromise Attack Targets: Corporate Printers?

The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude…

READ MORE
What Sets Falcon Apart: Intelligent Host Sensors

What Sets Falcon Apart: Intelligent Host Sensors

It can be difficult to distinguish between “next-generation” endpoint security solutions currently available.  Usually the technology lags marketing by a…

READ MORE
New Protection Capability Of Falcon For Mac: Improving Security With SUIDGuard

New Protection Capability of Falcon for Mac: Improving Security With SUIDGuard

A comprehensive Next-Generation Endpoint Protection strategy shouldn’t just be about reacting and responding to threats, but also be complemented by…

READ MORE
“You Want Me To Do What?” A Guide To Interpreting Cybersecurity Recommendations

“You Want Me to Do What?” A Guide to Interpreting Cybersecurity Recommendations

Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is…

READ MORE
Top 5 Cybersecurity Mistakes Companies Make And How To Avoid Them

Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them

Cybersecurity requires a holistic organizational approach. From the leadership to each rank-and-file employee, a concerted effort must be maintained to…

READ MORE
Nothing Else Is Working. Why Not Memory Forensics?

Nothing else is working. Why not memory forensics?

I ran across a couple of blog posts recently that were espousing the virtues of memory forensics.  Having developed a…

READ MORE
Sakula Reloaded

Sakula Reloaded

Often during the investigation of sophisticated threat actors, the demarcation between the different attackers and campaigns are blurry. Researchers need…

READ MORE
 

Stop Breaches with CrowdStrike Falcon Request A Demo