New Report Offers a Front Line View from Leading Threat Hunters
A new report from the CrowdStrike® Falcon® OverWatch™ team, “Observations from the Front Lines of Threat Hunting,” offers a unique…
Should You Worry About Software Supply Chain Attacks?
While there is much discussion today about potential weaknesses in the hardware supply chain, given the recent attacks attributed to…
Evaluating Your Organization’s Security Approach: Tips For BOD and C-Level Execs
For the last two decades or more, cybersecurity and its failures have directly impacted organizations’ bottom lines.The call for boards…
Meet CrowdStrike’s Adversary of the Month for September: COBALT SPIDER
COBALT SPIDER is a financially-motivated criminal group responsible for attacks on financial institutions (FIs) in Russia, Central Asia and Eastern…
Is There Such a Thing as a Malicious PowerShell Command?
PowerShell is a scripting language originally designed to automate Windows administrative tasks. In addition to running its native commands, it…
Leading Global Brands Secure Themselves with CrowdStrike
CrowdStrike® recently recognized several of its valued customers as winners of the first CrowdStrike Customer Excellence Awards. They were announced…
CrowdStrike Falcon Receives FedRAMP Authorization
CrowdStrike® is proud to announce today that it has officially received Federal Risk and Authorization Management Program (FedRAMP) authorization for…
Podcast Features George Kurtz on What it Takes to Build a Unicorn
A lot has been written about why startups fail — a 2017 report from The Harvard Business Review puts the…
When Cybersecurity Talent is Scarce
The shortage of resources and expertise is quickly becoming a major cybersecurity concern, but the problem is not new. In…