Best Practices: Improving Fault-Tolerance in Apache Kafka Consumer
How to effectively manage client-side partial failures, avoid data loss and process errors Apache Kafka is the gold standard for…
Employing FeatureUsage for Windows 10 Taskbar Forensics
During a cybersecurity investigation, digital forensics and incident response (DFIR) professionals need to obtain information from different artifacts to determine…
Oh No! My Data Science Is Getting Rust-y
Python is one of the most popular programming languages for data scientists — and for good reason. The Python Package…
Falcon X – Intelligent Alerts for a Remote Workforce
Introduction The widespread impact of the new coronavirus has not deterred cyber adversaries. In fact, quite the opposite is happening.…
The Business Case for “Remote-First”
How a distributed workforce enables better performance, stronger results and a positive culture Imagine it’s 2 a.m. ET on July…
Global Survey: The Cybersecurity Reality of the COVID-19 Remote Workforce
For many organizations, the rapid transition to an entirely remote workforce due to shelter-in-place orders has brought on a slew…
Host Firewall Protection for a Remote Workforce
Introduction With a remote workforce, traditional network protections no longer offer your first line of defense. Workers, laptops and data…
CrowdStrike Receives Highest Overall Score in Gartner Peer Insights for EDR for the Second Year in a Row
We did it again. In the May 2020 Gartner Peer Insights “Voice of the Customer” Endpoint Detection and Response Solutions…
Which Way Did She Go? Speeding Up Lateral Movement Investigations
One of the biggest challenges facing security investigators is creating a full picture of a threat, piecing together disparate pieces…
The Many Paths Through Maze
Maze ransomware is a recent addition to the ever-growing list of ransomware families. It stands out from the others by…