Compliance Q&A with CrowdStrike CIO Colin Black
CrowdStrike recently started to release a series of independent reports assessing the efficacy of the Falcon Host endpoint protection solution…
A Real-World Story of Stopping Malware-free Intrusions
When we tell customers that malware is just a minor part of the overall security breach problem, they often ask…
Bear Hunting: Tracking Down COZY BEAR Backdoors
As a follow-up to the CrowdStrike blog entry "Bears in the Midst" on June 15, 2016, we will walk through…
There is nothing more important than your health
It’s a common saying, and who would argue against it? The majority of us take our health very seriously. Our…
Who Is COZY BEAR (APT 29)?
The sophisticated threat actor COZY BEAR was initially identified in 2014. This actor has many other names in the information…
CrowdStrike Machine Learning and VirusTotal
Over the past three months, CrowdStrike worked closely with VirusTotal (VT), and we are excited to announce the integration of…
CrowdStrike Integrates Falcon Machine Learning Engine into VirusTotal
I am delighted to announce that CrowdStrike is the first company to integrate its signatureless machine learning engine into the…
Seeing the Forest For the Trees: How Proactive Threat Hunting Stops the Mega-Breach
In a recent CrowdCast webinar, CrowdStrike’s Senior Director of Hunting Operations, Kris Merritt, discusses core problems associated with automating cybersecurity…
CrowdStrike Falcon Platform Summer Release: Delivering HOT New Features
I often hear from Chief Information Security Officers (CISOs) how hard their job is and how often they are in…