VENOM Vulnerability: Community Patching And Mitigation Update

VENOM Vulnerability: Community Patching and Mitigation Update

Today, CrowdStrike disclosed a critical virtual machine escape vulnerability (which we named VENOM) discovered by our Senior Security Researcher Jason…

READ MORE
There Is No Such Thing As ‘Business As Usual’ When It Comes To Incident Response

There is no Such Thing as ‘Business as Usual’ When it Comes to Incident Response

When your network gets breached – and I do mean when and not if – the first question that needs to be answered is…

READ MORE
3 Tips For Operationalizing Cyber Intelligence

3 Tips for Operationalizing Cyber Intelligence

In 2014 it became abundantly clear that threat intelligence provides a decisive advantage in protecting your enterprise. Using threat intelligence,…

READ MORE
How To Think Like An Adversary To Defend Your Network

How to Think Like an Adversary to Defend Your Network

Today's adversaries are sophisticated, thinking ahead about what your defense strategies might be, and finding ways to circumvent your tactics. To stay…

READ MORE
RSA 2015 Hacking Exposed: CrowdResponse Update Released

RSA 2015 Hacking Exposed: CrowdResponse Update Released

George Kurtz, Dmitri Alperovitch and Elia Zaitsev have just finished up the Hacking Exposed: Beyond the Malware session at the RSA 2015…

READ MORE
Operational Threat Intelligence With Maltego Transform Hub

Operational threat intelligence with Maltego Transform Hub

“I’m drowning in data, but starving for information.” Ever feel that way? Recently, I heard a CISO use this as…

READ MORE
RSA Conference 2015: CrowdStrike Wants To Actually Meet You, Not Just See Your Badge Scan

RSA Conference 2015: CrowdStrike Wants to Actually Meet You, Not Just See Your Badge Scan

Can you believe that the 2015 RSA Conference starts in just a couple of days? Whether you’re flying in for…

READ MORE
Avoiding Maginot Line Mentality: What False Assumptions Underpin Current Cyber Security Strategies?

Avoiding Maginot Line Mentality: What False Assumptions Underpin Current Cyber Security Strategies?

Every week we hear of hacks even more fantastic and horrifying than the last. The latest news that the Russians…

READ MORE
Cyber Deterrence In Action? A Story Of One Long HURRICANE PANDA Campaign

Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign

Most companies tend to think of intrusions as discrete and infrequent events. The narrative often goes like this: a company…

READ MORE
Healthcare IT Security In The Spotlight: HIMMS 2015

Healthcare IT Security in the Spotlight: HIMMS 2015

April is an unbelievably busy month for IT security professionals. In addition to daily online combat with bears, kittens, pandas,…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo