CrowdStrike Investors Double Down And Lead $100 Million Series D Round To Support The Company’s Global Growth

CrowdStrike Investors Double Down and Lead $100 Million Series D Round to Support the Company’s Global Growth

When we founded CrowdStrike in 2011, cloud-based endpoint protection did not exist and the cloud was regarded as too risky…

READ MORE
Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; CrowdStrike Falcon Prevents The Attack

Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; CrowdStrike Falcon Prevents the Attack

Wanna Decryption Ransom Screen Wanna (also known as WannaCry, WCry, WanaCrypt and WanaCrypt0r) ransomware exploded onto the ransomware scene on…

READ MORE
CrowdStrike Falcon Prevents WannaCry Ransomware

CrowdStrike Falcon Prevents WannaCry Ransomware

Blog updated: May 14th  In this screenshot example from the Falcon UI, the detection process tree shows that the malicious…

READ MORE
How To Install Falcon Antivirus (AV) On The Mac Platform

How to Install Falcon Antivirus (AV) on the Mac Platform

Introduction This video illustrates Falcon's ability to protect against multiple threats on the Mac with low impact. Video Read Video Transcript…

READ MORE
How To Detect And Prevent Fileless Webshell Attacks With Falcon

How to Detect and Prevent Fileless Webshell Attacks with Falcon

Introduction This video illustrates Falcon's ability to detect fileless webshell attacks, or attacks that don't rely on malware, instead relying…

READ MORE
Why Dwell Time Continues To Plague Organizations

Why Dwell Time Continues to Plague Organizations

Global statistics in the most recent Ponemon report on the cost of a data breach show dwell time for malicious…

READ MORE
Important Trends From The 2017 Verizon Breach Report

Important Trends From the 2017 Verizon Breach Report

The 2017 Verizon Data Breach Investigations Report (DBIR) marks the 10th year this prestigious report has been published and as…

READ MORE
A Primer On Machine Learning In Endpoint Security

A Primer on Machine Learning in Endpoint Security

Although machine learning (ML)  isn’t a new concept —  it actually dates back to the origins of the computer itself…

READ MORE
What Causes IT Alert Fatigue And How To Avoid It

What Causes IT Alert Fatigue and How to Avoid It

A recent survey by the Cloud Security Alliance found, among other things, that out of a sampling of 2,542 anomalous…

READ MORE
Inside The Takedown Of ZOMBIE SPIDER And The Kelihos Botnet

Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet

This figure shows a snapshot of systems infected with Kelihos communicating with the sinkhole created to disable it. The arrest…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo