U.S. – China Cyber Agreement: Trust, But Verify

U.S. – China Cyber Agreement: Trust, but Verify

The joint U.S.-China cyber agreement announced today represents the next iteration of the ongoing cyber security saga between two world…

READ MORE
U.S. – China Agreement On Cyber Intrusions: An Inflection Point

U.S. – China Agreement on Cyber Intrusions: An Inflection Point

Chinese economic espionage reached its boiling point some time ago, and has been scalding industries throughout the world for years…

READ MORE
Solution Spotlight: Next-Generation Endpoint Security

Solution Spotlight: Next-Generation Endpoint Security

BUSINESS PERSPECTIVE *Excerpt from Solution Spotlight: Next-Generation Endpoint Security. Authored by Rafal Los, Director of Solutions Research, Optiv.  The topic of…

READ MORE
Brian Kelly, CSO Of Rackspace, Shares Why He Chose CrowdStrike

Brian Kelly, CSO of Rackspace, Shares Why He Chose CrowdStrike

When you’re in charge of protecting not only your company’s critical business information, but also that of your company’s customers,…

READ MORE
Where To Find CrowdStrike At Black Hat 2015

Where to find CrowdStrike at Black Hat 2015

I can’t believe another year has passed and it is time for the annual pilgrimage to Vegas for Black Hat/Defcon.…

READ MORE
Falcon Zero-Day Flash Detection

Falcon Zero-Day Flash Detection

In the wake of the Hacking Team leaks in early July, a result of an intrusion into the company’s network,…

READ MORE
Google Capital Bets Big On CrowdStrike To Accelerate Hyper-growth

Google Capital Bets Big on CrowdStrike to Accelerate Hyper-growth

It was almost four years ago that I co-founded CrowdStrike with intention of creating an enduring security company that would…

READ MORE
Cloud-based Security: Future Of The Industry?

Cloud-based Security: Future of the Industry?

Alex Stamos, formerly with Yahoo and now CSO at Facebook, gave  a really interesting talk at AppSec California 2015 recently…

READ MORE
3 Core Principles Of Next-Generation Endpoint Protection

3 Core Principles of Next-Generation Endpoint Protection

Most organizations today focus on protecting their networks against malware, exploits, malicious websites, and unpatched vulnerabilities. Unfortunately, there is a…

READ MORE
Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

Five Steps to Incorporate Adversary Intelligence into Your Cybersecurity Program

With adversary focused threat intelligence, security professionals can proactively defend their enterprises and understand the details of the motivations, intent,…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial