Threat Intelligence the CrowdStrike Way
Introduction This document and video will provide an overview of CrowdStrike’s Intelligence services and the importance of consumable intelligence. Video…
How to Leverage Falcon Sandbox Analysis
Introduction This document and video will illustrate the power of Falcon Sandbox and how it differentiates itself from other solutions…
CrowdStrike for Security Operations
Introduction This document and video will demonstrate how the CrowdStrike solution empowers the Security Operations Center to detect and understand…
Adversary Extends Persistence by Modifying System Binaries
At the end of September 2018, the CrowdStrike® Falcon OverWatch™ team identified suspicious interactive activity on a Linux host within…
Confessions of a Responder: The Hardest Part of Incident Response Investigations
It’s not the disk forensics. It’s not the log analysis. It’s not even the lawyers (we love working with law…
Big Data, Graph, and the Cloud: Three Keys to Stopping Today’s Threats
An edited version of this blog was published as an article in Teiss on December 12, 2018. Graph databases are…