RECENT ARTICLES

Application Hygiene For A Remote Workforce

Application Hygiene for a Remote Workforce

Introduction Many organizations around the globe are developing a “new normal” - striving to maintain the same productivity while utilizing…

READ MORE
How CrowdStrike Protects Linux Hosts

How CrowdStrike Protects Linux Hosts

Introduction CrowdStrike provides proven endpoint security through a cloud delivered platform via a single lightweight agent that supports all workloads…

READ MORE
CharCNNs And PowerShell Scripts: Yet Another Fight Against Malware

CharCNNs and PowerShell Scripts: Yet Another Fight Against Malware

Malware in the Scripting Landscape Scripting is a well-known means of spreading malware. Easy to write and often difficult for…

READ MORE
Staying Off The Land: A Threat Actor Methodology

Staying Off the Land: A Threat Actor Methodology

With offense-focused methodologies being created around “living off the land” and “bring your own land,” we would like to cover…

READ MORE
How To Install Falcon Sensor With Amazon WorkSpaces

How to Install Falcon Sensor with Amazon WorkSpaces

Introduction In this article, we will show you how the Falcon sensor can be installed on Amazon WorkSpaces to deploy…

READ MORE
How To Integrate CrowdStrike With Zscaler Private Access

How to Integrate CrowdStrike with Zscaler Private Access

Introduction As enterprises move application and resources to the cloud, users are connecting to them remotely from coffee shops, airports,…

READ MORE
How To Integrate CrowdStrike With Zscaler Internet Access

How to Integrate CrowdStrike with Zscaler Internet Access

Introduction Users and applications are moving to the cloud and putting a strain on legacy “castle-and-moat” network security. Legacy security…

READ MORE
CrowdStrike Falcon Dominance Evident In MITRE ATT&CK Evaluation With 100% Detection Across All 19 Attack Phases

CrowdStrike Falcon Dominance Evident in MITRE ATT&CK Evaluation With 100% Detection Across All 19 Attack Phases

This week marks the release of results from the second iteration of MITRE’s recurring ATT&CK Evaluation program, and I could…

READ MORE
Securing Mobile Devices For A Remote Workforce

Securing Mobile Devices for a Remote Workforce

Introduction Around the globe, IT teams are rapidly adapting to evolving security requirements. This includes transitioning employees to remote workers…

READ MORE
Exploiting GlobalProtect For Privilege Escalation, Part Two: Linux And MacOS

Exploiting GlobalProtect for Privilege Escalation, Part Two: Linux and macOS

This is the second blog in a two-part series covering the exploitation of the Palo Alto Networks GlobalProtect VPN client…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial