CrowdStrike Joins with Netskope, Okta and Proofpoint to Secure Remote Work Anytime and Anywhere at Scale
CrowdStrike, Netskope, Okta and Proofpoint are joining together to help better safeguard organizations by delivering an integrated, Zero Trust security…
GuLoader: Peering Into a Shellcode-based Downloader
GuLoader, a malware family that emerged in the wild late last year, is written in Visual Basic 6 (VB6), which…
Remote-Friendly vs. Remote-First: Being Part of CrowdStrike’s Distributed Workforce
Over the past decade, remote work has been gradually shifting from a coveted perk to a popular arrangement, especially in…
Expanding Protection with Remote System Control
Introduction Sinkholes can be used by both bad actors and system administrators alike. Bad actors can redirect systems to malicious…
We Stop. So You Can Go.
In March 2020, at the beginning of the U.S. response to the worldwide COVID-19 pandemic, I expressed my gratitude for…
CrowdStrike Incident Workbench Speeds Incident Response
Recently, CrowdStrike introduced the new CrowdStrike® Incident Workbench, a more effective and efficient way to visualize and prioritize security incidents.…
Threat Hunting with a Remote Workforce
Introduction In the world of cybersecurity, adversaries and defenders are constantly trying to outmaneuver each other and gain strategic advantage. …
Sneak Peek: 2020 Fal.Con for Public Sector Virtual Cybersecurity Conference
Although the global COVID-19 pandemic has required the cancellation of many events this year, the CrowdStrike® 2020 Fal.Con for Public…
Attackers Are Targeting Cloud Service Providers
Companies are increasingly relying on cloud-based infrastructure, especially as more of their employees are working remotely — and may continue…