Healthcare IT Security in the Spotlight: HIMMS 2015
April is an unbelievably busy month for IT security professionals. In addition to daily online combat with bears, kittens, pandas,…
Solving the Right Problem: Stop Adversaries, Not Just Their Tools
A malware-centric strategy is mere child's play against today's sophisticated adversaries. Here's why. Most organizations today focus on protecting their…
Adversaries Set Their Sights on Oil and Gas Sector
With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those…
CrowdStrike to Participate in Nine Speaking Sessions at RSA 2015
I am always looking forward to attending the annual RSA Conference. This year, we are particularly excited as our team…
New White House Executive Order: Sanctions in Response to Cyber Intrusions
Update: Here is the link the White House announcement of the Executive Order For the last 4 years, I have persistently advocated for…
Chopping packets: Decoding China Chopper Web shell traffic over SSL
Introduction The Chopper Web shell is a widely used backdoor by Chinese and other malicious actors to remotely access a…
The Future of Privacy, Data, and Cyber Crime and its Impact on the American Business Dream
There is absolutely no doubt that the world is changing more quickly now, thanks to technology, than at any other…
Best Practices for Protecting Healthcare Sector Networks and Data
If the Target breach was the wake-up call to the retail sector that cyber security was no longer just an…
Surgeon with a Shotgun! – Memory Forensics
With the ever-increasing need for speed and accuracy for digital investigations and incident response, it is imperative that organizations are…
Magic 8 Ball Says “Outlook Good” for CyberSecurity Collaboration and Legislation in 2015
As we all know, cybersecurity is very hard to legislate. Everyone agrees on the overall principle, but when it comes…