Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units
Update - As of March 2017, the estimated losses of D-30 howitzer platform have been amended. According to an update…
CrowdStrike Releases New Update To Falcon Orchestrator
Earlier this year, CrowdStrike released Falcon Orchestrator as a contribution to the open source community. By leveraging the robust Falcon…
Defeating Adversaries Requires a Proactive Cybersecurity Strategy
“Hope is not a strategy.” While blunt in delivery, the message implied in Vince Lombardi’s famous saying is simple: to…
Multi-Layered Prevention for the Endpoint
Benjamin Franklin wisely stated that, “An ounce of prevention is worth a pound of cure.” In keeping with this timeless…
Critical Infrastructure: One More Thing to Give Thanks For — and Protect
November 2016 has been proclaimed Critical Infrastructure Security and Resilience Month. This is an annual effort, beginning this year, to…
‘Tis the Season for Account Thievin’
Brooklyn born Willie Sutton made a career in crime; robbing banks and jewelry stores often in disguise earning him the…
CrowdStrike Falcon Certified as Legacy AV Replacement
We started CrowdStrike five years ago with the mission to revolutionize endpoint security. At that time, no one was talking…
CrowdStrike and NIST 800-53: Now That’s What I Call a “Twofer”
“Twofer” has entered into the lexicon of everyday use. The Urban Dictionary defines it as the opportunity to receive the…
Uncle Sam Gets an Incident Response Plan
Once upon a time, when presidential politics were more sedate, the leader of the free world quipped that the nine…
The Three Steps of Proactive Threat Hunting
Security teams in the private and public sector are increasingly recognizing the need to actively “hunt” for threats targeting their…