RECENT ARTICLES

“You Want Me To Do What?” A Guide To Interpreting Cybersecurity Recommendations

“You Want Me to Do What?” A Guide to Interpreting Cybersecurity Recommendations

Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is…

READ MORE
Top 5 Cybersecurity Mistakes Companies Make And How To Avoid Them

Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them

Cybersecurity requires a holistic organizational approach. From the leadership to each rank-and-file employee, a concerted effort must be maintained to…

READ MORE
Nothing Else Is Working. Why Not Memory Forensics?

Nothing else is working. Why not memory forensics?

I ran across a couple of blog posts recently that were espousing the virtues of memory forensics.  Having developed a…

READ MORE
Sakula Reloaded

Sakula Reloaded

Often during the investigation of sophisticated threat actors, the demarcation between the different attackers and campaigns are blurry. Researchers need…

READ MORE
How To Learn From Adversaries As They Test Attack Strategies

How to Learn from Adversaries as they Test Attack Strategies

According to a recent Harvard Business Review report, 84 percent of enterprises have increased their Cloud usage in the past…

READ MORE
5 Reasons Endpoint Security Must Move To The Cloud

5 Reasons Endpoint Security Must Move To The Cloud

As organizations grow and become more distributed, adding more endpoints across the enterprise, sophisticated adversaries will continue to aggressively target…

READ MORE
Blurring Of Commodity And Targeted Attack Malware

Blurring of Commodity and Targeted Attack Malware

As malware and its authors continue to evolve, deciphering the purpose of specific malware-driven attacks has become more challenging. While…

READ MORE
Adjust Your Priorities For Risk-Centric Asset Management

Adjust Your Priorities for Risk-Centric Asset Management

This is the first in a recurring series that explores the functions, categories and subcategories of the National Institute of…

READ MORE
Should I Really Trust The Cloud With My Endpoint Protection?

Should I Really Trust the Cloud with my Endpoint Protection?

The radical shift in the scale and economics of cybercrime calls for an equally radical change in how IT protects user…

READ MORE
U.S. – China Cyber Agreement: Trust, But Verify

U.S. – China Cyber Agreement: Trust, but Verify

The joint U.S.-China cyber agreement announced today represents the next iteration of the ongoing cyber security saga between two world…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial