The Right Endpoint Detection And Response (EDR) Can Mitigate Silent Failure

The Right Endpoint Detection and Response (EDR) Can Mitigate Silent Failure

In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris…

READ MORE
Webcast Offers Critical Factors For Effective Endpoint Detection And Response (EDR)

Webcast Offers Critical Factors for Effective Endpoint Detection and Response (EDR)

In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris…

READ MORE
Address Zero-Day Threats Long Before An Attack Occurs

Address Zero-Day Threats Long Before an Attack Occurs

A recent interview with CrowdStrike VP of Product Marketing Dan Larson, for the CyberWire Daily Podcast, focuses on “zero-day” attacks…

READ MORE
New York State Cybersecurity Regulations For Financial Institutions Are Tough, Critical, And Reach Beyond State Borders

New York State Cybersecurity Regulations for Financial Institutions are Tough, Critical, and Reach Beyond State Borders

Given today’s global cyber threatscape, the increased amount of targeted attacks against the financial sector — and New York City’s…

READ MORE
Decrypting NotPetya/Petya: Tools For Recovering Your MFT After An Attack

Decrypting NotPetya/Petya: Tools for Recovering Your MFT After an Attack

Making the world a better place has always been a core goal of CrowdStrike. In this blog post, we are…

READ MORE
Preventing Sophisticated Attacks: Tips From A Real-World Incident Responder

Preventing Sophisticated Attacks: Tips From a Real-World Incident Responder

Robin Jackson, principal consultant for CrowdStrike, has had extensive experience investigating some of today’s most prolific threat actors. He’s also…

READ MORE
How To Configure Falcon Data Replicator

How to Configure Falcon Data Replicator

Introductions Falcon Data Replicator is a service that provides raw CrowdStrike events in JSON format via Amazon Web Services Simple…

READ MORE
CrowdStrike Falcon Endpoint Protection Receives Five Stars Across The Board In SC Magazine Evaluation

CrowdStrike Falcon Endpoint Protection Receives Five Stars Across the Board in SC Magazine Evaluation

The CrowdStrike Falcon platform recently participated in a group evaluation by SC Magazine’s testing team, a U.S.-based team that includes…

READ MORE
How To Block Malicious PowerShell Activity: Bypassing Traditional AV

How to Block Malicious PowerShell Activity: Bypassing Traditional AV

Introduction Attacks that forego the use of malware in favor of more subtle techniques like PowerShell and other script based attacks…

READ MORE
Four Steps To Choosing The Right Antivirus Replacement

Four Steps to Choosing the Right Antivirus Replacement

Few security experts would dispute the fact that legacy antivirus (AV) solutions are no match for today’s most stealthy and…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo