RECENT ARTICLES

Installing Falcon For Mobile On Android Devices

Installing Falcon for Mobile on Android Devices

Introduction Falcon for Mobile expands EDR capabilities beyond the desktop by monitoring and recording activities taking place on mobile devices.…

READ MORE
How To Install The Falcon Agent – Mac

How to Install the Falcon Agent – Mac

Introduction This article walks through installation of the Falcon Sensor on a Mac. Video  Read Video Transcript Prerequisites Installing…

READ MORE
Security For Cloud And Container Workloads

Security for Cloud and Container Workloads

Security for Cloud and Container Workloads How to Get Visibility into AWS How Falcon for AWS Protects Cloud Workloads How…

READ MORE
How To Secure Identity Services With Falcon Horizon

How to Secure Identity Services with Falcon Horizon

Introduction The shift to leverage public cloud infrastructure not only increases an organization’s attack surface, but also introduces different tools…

READ MORE
Regional Sales Director Paul Salmon On Creating A Barrier-free Culture

Regional Sales Director Paul Salmon on Creating a Barrier-free Culture

2020 was a tough year for many working professionals around the world. Paul Salmon, regional director of Australia’s northern region,…

READ MORE
Making Threat Graph Extensible: Leveraging The Intermediate Representation To Generate Go Code (Part 2 Of 2)

Making Threat Graph Extensible: Leveraging the Intermediate Representation to Generate Go Code (Part 2 of 2)

In our earlier post, Making Threat Graph Extensible: Leveraging a DSL to Improve Data Ingestion (Part 1 of 2), we…

READ MORE
Adversary Quest Walkthrough, Part 1: Four CATAPULT SPIDER ECrime Challenges

Adversary Quest Walkthrough, Part 1: Four CATAPULT SPIDER eCrime Challenges

At the end of January 2021, the CrowdStrike Intelligence Advanced Research Team hosted our first-ever Adversary Quest. This “capture the…

READ MORE
Vulnerability Roundup: 10 Critical CVEs Of 2020

Vulnerability Roundup: 10 Critical CVEs of 2020

One lesson from 2020 is clear: Patching security holes must be a high priority for security operations teams throughout this…

READ MORE
Women Code-Breakers Through Time

Women Code-Breakers Through Time

When you think about your favorite childhood heroes, which superpowers come to mind? Perhaps it’s the ability to fly, move…

READ MORE
AWS Women’s Day Panel, March 31: Join CrowdStrike’s VP Of Cloud Product Sales And Partnerships, Jessica Alexander

AWS Women’s Day Panel, March 31: Join CrowdStrike’s VP of Cloud Product Sales and Partnerships, Jessica Alexander

On March 31, CrowdStrike will be participating in the AWS Women’s Day panel discussion, “Things I Wish Someone Would Have…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial