The 2015 Global Threat Report: The Paradigm Shifts- People, Process, Technology, AND Intelligence
If there’s one thing that businesses, boards of directors and C-level execs can take from CrowdStrike’s 2015 Threat Report, is…
2015 CrowdStrike Global Threat Report Preview
Update: CrowdStrike's 2020 Global Threat Report is now available! Download the report to stay ahead of today's adversaries. With every…
4.0 Another Brick In The CryptoWall
Introduction For as long as there have been people using the World Wide Web, criminal groups have tried to extort…
The Security Roadmap – Planning for Job Security
In my previous blog post titled “’You Want Me to Do What?’ A Guide to Interpreting Cybersecurity Recommendations”, we discussed…
More Than Just Your eSignature: The Analysis
CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…
More than just your eSignature
CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…
The Importance of Logs
Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear:…
Compromise Attack Targets: Corporate Printers?
The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude…
What Sets Falcon Apart: Intelligent Host Sensors
It can be difficult to distinguish between “next-generation” endpoint security solutions currently available. Usually the technology lags marketing by a…
New Protection Capability of Falcon for Mac: Improving Security With SUIDGuard
A comprehensive Next-Generation Endpoint Protection strategy shouldn’t just be about reacting and responding to threats, but also be complemented by…