RECENT ARTICLES

The 2015 Global Threat Report: The Paradigm Shifts- People, Process, Technology, AND Intelligence

The 2015 Global Threat Report: The Paradigm Shifts- People, Process, Technology, AND Intelligence

If there’s one thing that businesses, boards of directors and C-level execs can take from CrowdStrike’s 2015 Threat Report, is…

READ MORE
2015 CrowdStrike Global Threat Report Preview

2015 CrowdStrike Global Threat Report Preview

Update: CrowdStrike's 2020 Global Threat Report is now available! Download the report to stay ahead of today's adversaries. With every…

READ MORE
4.0 Another Brick In The CryptoWall

4.0 Another Brick In The CryptoWall

Introduction For as long as there have been people using the World Wide Web, criminal groups have tried to extort…

READ MORE
The Security Roadmap – Planning For Job Security

The Security Roadmap – Planning for Job Security

In my previous blog post titled “’You Want Me to Do What?’ A Guide to Interpreting Cybersecurity Recommendations”, we discussed…

READ MORE
More Than Just Your ESignature: The Analysis

More Than Just Your eSignature: The Analysis

CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…

READ MORE
More Than Just Your ESignature

More than just your eSignature

CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…

READ MORE
The Importance Of Logs

The Importance of Logs

Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear:…

READ MORE
Compromise Attack Targets: Corporate Printers?

Compromise Attack Targets: Corporate Printers?

The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude…

READ MORE
What Sets Falcon Apart: Intelligent Host Sensors

What Sets Falcon Apart: Intelligent Host Sensors

It can be difficult to distinguish between “next-generation” endpoint security solutions currently available.  Usually the technology lags marketing by a…

READ MORE
New Protection Capability Of Falcon For Mac: Improving Security With SUIDGuard

New Protection Capability of Falcon for Mac: Improving Security With SUIDGuard

A comprehensive Next-Generation Endpoint Protection strategy shouldn’t just be about reacting and responding to threats, but also be complemented by…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial