How We Use Apache Airflow at CrowdStrike, Part 1
Introduction Machine learning is one of the many tools we use at CrowdStrike® to stop breaches. To do it well,…
CrowdStrike Services Report Focuses on Trends Observed in 2019 and the Outlook for 2020
The CrowdStrike Services team has issued their latest report: “CrowdStrike Services Cyber Front Lines Report: Observations From the Front Lines…
A Roadmap to Cybersecurity Maturity, Part 1: Am I Breached?
A new report from CrowdStrike® Services titled “Achieving Security Maturity: A Roadmap to Building a Robust Cybersecurity Capability,” examines the…
CrowdStrike VP of Technology Strategy Offers Four Cyber Threat Predictions for 2020
2019 has ended and as we look forward to the new year, one thing you are sure to see is…
A Legal Perspective: Best Practices for Prevention and Immediate Response to a Breach
This blog originally appeared on Nov.20, 2019, as an article in LawyersWeekly.com.au, a site dedicated to independent news, analysis and…
CrowdStrike Webcast with Mercedes-AMG Petronas Motorsport Focuses on the Need for Speed in Cybersecurity
An on-demand webcast featuring CrowdStrike Sr. Engineer Zeki Turedi and Mercedes-AMG Petronas Head of IT Matt Harris details why speed,…
Who is REFINED KITTEN?
Common Aliases REFINED KITTEN may also be identified by the following pseudonyms: APT33 Elfin Magnallium Holmium REFINED KITTEN’s Origins REFINED…
CSO Australia on CrowdStrike Global Security Attitude Survey and What it Means for APAC Region
A recent article in CSO Australia titled, “Australian businesses slower to detect breaches than global peers, but everyone is still…