Toolkit Helps Evaluate “Next Generation” Endpoint Protection Platforms
A growing number of products in the marketplace tout themselves as being part of the “next generation” in endpoint protection.…
CrowdStrike evaluated in Gartner’s Comparison of Endpoint Detection and Response Technologies and Solutions
Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*.…
CrowdStrike’s Spring Release: The Core Four of Next-Generation Endpoint Security
When you’re the first company to deliver endpoint security from the cloud, you need to build the product on a…
CrowdResponse Release and new @Tasks modules
With the ongoing need to effectively and quickly detect and respond to attacks, CrowdStrike is excited to release a new…
State of the Criminal Address
Over the past few months CrowdStrike has conducted several investigations in the hospitality, food services, and gaming industries, helping organizations…
Solving Intractable Performance Problems Through Vertical Engineering
Owning the Image Object File Format, the Compiler Toolchain, and the Operating System As the Windows kernel continues to pursue…
5 Common Mistakes to Avoid in Cyber Incident Response
Network intrusions have become a fact of corporate life, and increasingly are viewed as among the many costs of doing…
Mergers and Acquisitions: Cybersecurity Due Diligence
The year 2015 marked the highest ever value of mergers & acquisitions with an astounding $4.6 trillion. If 2016 follows…
M&A – Buying While Cyber Blind?
Mergers and acquisitions: Many organizations utilize these activities to move their business forward by expanding into different market segments or…
Cyber Skirmish: Russia v. Turkey
On the morning of 24 November 2015 an F-16 operated by the Turkish Air Force dropped into position behind a…