ITProPortal: CrowdStrike Discusses Life Beyond Malware
This article, “Life Beyond Malware,” originally appeared on ITProPortal and is published here with their permission. The traditional cybersecurity model…
Make Ugly Babies Cute Again: An M&A Crisis Aversion Story
Parents have an inherent predisposition to believe their children are absolutely beautiful. Even when their children aren't much more than…
CrowdStrike’s First Fal.Con for Public Sector: State of the Threat and New Defense Strategies
The incredible success of the CrowdStrike annual Fal.Con cybersecurity conferences has led to a new Fal.Con event devoted exclusively to…
How Businesses Can Stay One Step Ahead of the Cybersecurity Hydra
In a recent interview conducted by TechRadar Pro, I shared my perspective on some of the key findings from the…
Gartner Report: Prepare for Endpoint Protection Shifting to the Cloud
“The endpoint protection market is undergoing its biggest transformation in the last 20 years.” — Gartner, the leading research and…
CSO Online: Insights on Cyber Espionage From CrowdStrike VP Mike Sentonas
An article on CSO India titled “Cyber Espionage Shows No Signs of Slowing Down,” by Soumik Gosh, presents CrowdStrike® VP…
Going Beyond Malware: The Rise of “Living off the Land” Attacks
This article was originally published on CSO, April 30, 2019 If you’re living off the land, there are a few…
CrowdStrike Falcon: First Endpoint Protection to Integrate Firmware Attack Detection Capability
Today’s endpoint security solutions have been designed primarily to look at the local operating system (OS) and the applications that…
When Tabletop Exercises Become Real-World Events
It happened again a couple months ago; an eerie sense of déjà vu as I read reports about suspected malware-enabled…
On-Demand Webcast Offers Recommendations for Closing the Cybersecurity Talent Gap
A CrowdStrike® on-demand webcast, presented by Product Marketing Director Jackie Castelli, examines the critical shortage organizations are facing as they…