The Security Roadmap – Planning For Job Security

The Security Roadmap – Planning for Job Security

In my previous blog post titled “’You Want Me to Do What?’ A Guide to Interpreting Cybersecurity Recommendations”, we discussed…

READ MORE
More Than Just Your ESignature: The Analysis

More Than Just Your eSignature: The Analysis

CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…

READ MORE
More Than Just Your ESignature

More than just your eSignature

CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…

READ MORE
Next Gen Penetration Testing: An Adversarial Approach

Next Gen Penetration Testing: An Adversarial Approach

In today’s dynamic security world, organizations must understand the benefits of proactively testing their cyber security posture to properly defend…

READ MORE
The Importance Of Logs

The Importance of Logs

Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear:…

READ MORE
Compromise Attack Targets: Corporate Printers?

Compromise Attack Targets: Corporate Printers?

The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude…

READ MORE
What Sets Falcon Apart: Intelligent Host Sensors

What Sets Falcon Apart: Intelligent Host Sensors

It can be difficult to distinguish between “next-generation” endpoint security solutions currently available.  Usually the technology lags marketing by a…

READ MORE
New Protection Capability Of Falcon For Mac: Improving Security With SUIDGuard

New Protection Capability of Falcon for Mac: Improving Security With SUIDGuard

A comprehensive Next-Generation Endpoint Protection strategy shouldn’t just be about reacting and responding to threats, but also be complemented by…

READ MORE
“You Want Me To Do What?” A Guide To Interpreting Cybersecurity Recommendations

“You Want Me to Do What?” A Guide to Interpreting Cybersecurity Recommendations

Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is…

READ MORE
Top 5 Cybersecurity Mistakes Companies Make And How To Avoid Them

Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them

Cybersecurity requires a holistic organizational approach. From the leadership to each rank-and-file employee, a concerted effort must be maintained to…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial