CrowdStrike’s Austin Murphy: The Cybersecurity Skills Gap and the Importance of Addressing Capacity
Tom Field from ISMG recently sat down with CrowdStrike® Vice President of Managed Services Austin Murphy to get his insight into…
Dark Reading: CrowdStrike’s Adam Meyers on eCrime Actors’ Pivot to Ransomware
A recent article on Dark Reading by CrowdStrike VP of Intelligence Adam Meyers is titled “The Big E-Crime Pivot.” It…
CrowdStrike Becomes a Publicly Traded Company
I’m proud to announce that as of today, CrowdStrike® is a publicly traded company on The Nasdaq Global Select Market…
How to Hunt with CrowdStrike Falcon
Introduction This document and the included videos will look at three different use cases to demonstrate how to hunt for…
Best practices for Mobile Device Security
This article appeared in Security Brief, New Zealand and is republished here with their permission. Mobile phones have a huge…
Watch Compelling Keynotes and Sessions from the Fal.Con for Public Sector Conference
CrowdStrike’s first Fal.Con for Public Sector cybersecurity conference — held last week at the new International Spy Museum in Washington…
CrowdStrike Addresses the Need for Speed and a Proactive Approach at This Year’s Gartner Summit
The Gartner 2019 Security and Risk Management Summit, June 17-20 in National Harbor, Maryland, will focus on the challenges presented…
How to Deploy CrowdStrike Falcon Using Jamf Pro
Introduction This article provides basic information about the installation of CrowdStrike Falcon sensor using Jamf Pro. Prerequisites Jamf Pro 10.9…
How to Use CrowdStrike with IBM’s QRadar
Introduction The CrowdStrike platform includes an extensive set of API’s for use by both customers and partners. In this video…
Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER
The tactic of singling out large organizations for high ransom payouts has signaled a shift in the eCrime ecosystem, with…