Solution Spotlight: Next-Generation Endpoint Security
BUSINESS PERSPECTIVE *Excerpt from Solution Spotlight: Next-Generation Endpoint Security. Authored by Rafal Los, Director of Solutions Research, Optiv. The topic of…
Brian Kelly, CSO of Rackspace, Shares Why He Chose CrowdStrike
When you’re in charge of protecting not only your company’s critical business information, but also that of your company’s customers,…
Where to find CrowdStrike at Black Hat 2015
I can’t believe another year has passed and it is time for the annual pilgrimage to Vegas for Black Hat/Defcon.…
Falcon Zero-Day Flash Detection
In the wake of the Hacking Team leaks in early July, a result of an intrusion into the company’s network,…
Google Capital Bets Big on CrowdStrike to Accelerate Hyper-growth
It was almost four years ago that I co-founded CrowdStrike with intention of creating an enduring security company that would…
Cloud-based Security: Future of the Industry?
Alex Stamos, formerly with Yahoo and now CSO at Facebook, gave a really interesting talk at AppSec California 2015 recently…
Rhetoric Foreshadows Cyber Activity in the South China Sea
As the increasingly aggressive rhetoric surrounding the conflict in the South China Sea (SCS) continues to dominate both Western and…
VENOM Vulnerability Details
Recently, I discovered a vulnerability in QEMU's virtual Floppy Disk Controller (FDC), exploitation of which may allow malicious code inside…
VENOM Vulnerability: Community Patching and Mitigation Update
Today, CrowdStrike disclosed a critical virtual machine escape vulnerability (which we named VENOM) discovered by our Senior Security Researcher Jason…
There is no Such Thing as ‘Business as Usual’ When it Comes to Incident Response
When your network gets breached – and I do mean when and not if – the first question that needs to be answered is…