3 Tips For Operationalizing Cyber Intelligence

3 Tips for Operationalizing Cyber Intelligence

In 2014 it became abundantly clear that threat intelligence provides a decisive advantage in protecting your enterprise. Using threat intelligence,…

READ MORE
How To Think Like An Adversary To Defend Your Network

How to Think Like an Adversary to Defend Your Network

Today's adversaries are sophisticated, thinking ahead about what your defense strategies might be, and finding ways to circumvent your tactics. To stay…

READ MORE
RSA 2015 Hacking Exposed: CrowdResponse Update Released

RSA 2015 Hacking Exposed: CrowdResponse Update Released

George Kurtz, Dmitri Alperovitch and Elia Zaitsev have just finished up the Hacking Exposed: Beyond the Malware session at the RSA 2015…

READ MORE
Operational Threat Intelligence With Maltego Transform Hub

Operational threat intelligence with Maltego Transform Hub

“I’m drowning in data, but starving for information.” Ever feel that way? Recently, I heard a CISO use this as…

READ MORE
RSA Conference 2015: CrowdStrike Wants To Actually Meet You, Not Just See Your Badge Scan

RSA Conference 2015: CrowdStrike Wants to Actually Meet You, Not Just See Your Badge Scan

Can you believe that the 2015 RSA Conference starts in just a couple of days? Whether you’re flying in for…

READ MORE
Avoiding Maginot Line Mentality: What False Assumptions Underpin Current Cyber Security Strategies?

Avoiding Maginot Line Mentality: What False Assumptions Underpin Current Cyber Security Strategies?

Every week we hear of hacks even more fantastic and horrifying than the last. The latest news that the Russians…

READ MORE
Cyber Deterrence In Action? A Story Of One Long HURRICANE PANDA Campaign

Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign

Most companies tend to think of intrusions as discrete and infrequent events. The narrative often goes like this: a company…

READ MORE
Healthcare IT Security In The Spotlight: HIMMS 2015

Healthcare IT Security in the Spotlight: HIMMS 2015

April is an unbelievably busy month for IT security professionals. In addition to daily online combat with bears, kittens, pandas,…

READ MORE
Solving The Right Problem: Stop Adversaries, Not Just Their Tools

Solving the Right Problem: Stop Adversaries, Not Just Their Tools

A malware-centric strategy is mere child's play against today's sophisticated adversaries. Here's why. Most organizations today focus on protecting their…

READ MORE
Adversaries Set Their Sights On Oil And Gas Sector

Adversaries Set Their Sights on Oil and Gas Sector

With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo