RSA Conference 2015: CrowdStrike Wants To Actually Meet You, Not Just See Your Badge Scan

RSA Conference 2015: CrowdStrike Wants to Actually Meet You, Not Just See Your Badge Scan

Can you believe that the 2015 RSA Conference starts in just a couple of days? Whether you’re flying in for…

READ MORE
Avoiding Maginot Line Mentality: What False Assumptions Underpin Current Cyber Security Strategies?

Avoiding Maginot Line Mentality: What False Assumptions Underpin Current Cyber Security Strategies?

Every week we hear of hacks even more fantastic and horrifying than the last. The latest news that the Russians…

READ MORE
Cyber Deterrence In Action? A Story Of One Long HURRICANE PANDA Campaign

Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign

Most companies tend to think of intrusions as discrete and infrequent events. The narrative often goes like this: a company…

READ MORE
Healthcare IT Security In The Spotlight: HIMMS 2015

Healthcare IT Security in the Spotlight: HIMMS 2015

April is an unbelievably busy month for IT security professionals. In addition to daily online combat with bears, kittens, pandas,…

READ MORE
Solving The Right Problem: Stop Adversaries, Not Just Their Tools

Solving the Right Problem: Stop Adversaries, Not Just Their Tools

A malware-centric strategy is mere child's play against today's sophisticated adversaries. Here's why. Most organizations today focus on protecting their…

READ MORE
Adversaries Set Their Sights On Oil And Gas Sector

Adversaries Set Their Sights on Oil and Gas Sector

With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those…

READ MORE
CrowdStrike To Participate In Nine Speaking Sessions At RSA 2015

CrowdStrike to Participate in Nine Speaking Sessions at RSA 2015

I am always looking forward to attending the annual RSA Conference. This year, we are particularly excited as our team…

READ MORE
New White House Executive Order: Sanctions In Response To Cyber Intrusions

New White House Executive Order: Sanctions in Response to Cyber Intrusions

Update: Here is the link the White House announcement of the Executive Order For the last 4 years, I have persistently advocated for…

READ MORE
Chopping Packets: Decoding China Chopper Web Shell Traffic Over SSL

Chopping packets: Decoding China Chopper Web shell traffic over SSL

Introduction The Chopper Web shell is a widely used backdoor by Chinese and other malicious actors to remotely access a…

READ MORE
The Future Of Privacy, Data, And Cyber Crime And Its Impact On The American Business Dream

The Future of Privacy, Data, and Cyber Crime and its Impact on the American Business Dream

There is absolutely no doubt that the world is changing more quickly now, thanks to technology, than at any other…

READ MORE
 

Stop Breaches with CrowdStrike Falcon Request A Demo