X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
How To Generate Your First Detection

How to Generate Your First Detection

Introduction In this document and video, you'll see how to generate your first detection.  You will also see how Falcon…

READ MORE
Confessions Of A Responder: The Hardest Part Of Incident Response Investigations

Confessions of a Responder: The Hardest Part of Incident Response Investigations

It’s not the disk forensics. It’s not the log analysis. It’s not even the lawyers (we love working with law…

READ MORE
Big Data, Graph, And The Cloud: Three Keys To Stopping Today’s Threats

Big Data, Graph, and the Cloud: Three Keys to Stopping Today’s Threats

An edited version of this blog was published as an article in Teiss on December 12, 2018. Graph databases are…

READ MORE
MITRE ATT&CK: Why Detections And Tainted Telemetry Are Required For An Effective EDR Solution

MITRE ATT&CK: Why Detections and Tainted Telemetry are Required for an Effective EDR Solution

Following the MITRE ATT&CK™ Evaluation of endpoint detection and response (EDR) solutions, I've heard a lot of confusion surrounding the…

READ MORE
Article Stresses The Need For Strong Cybersecurity Governance At All Points In The Investment Chain

Article Stresses The Need For Strong Cybersecurity Governance at All Points in The Investment Chain

This article is republished by permission and is an excerpt from White & Case Private Equity Viewpoint magazine, Issue #2:…

READ MORE
The CrowdStrike Services Cyber Intrusion Casebook 2018 Offers Compelling Stories From The Front Lines Of Incident Response

The CrowdStrike Services Cyber Intrusion Casebook 2018 Offers Compelling Stories from the Front Lines of Incident Response

Download The CrowdStrike Services Cyber Intrusion Casebook 2018 In the last few years, the cybersecurity world has seen a rise…

READ MORE
CrowdStrike CTO’s Senate Testimony On Countering Nation-State Cyberattacks — Part 3: The “1-10-60” Rule

CrowdStrike CTO’s Senate Testimony on Countering Nation-State Cyberattacks — Part 3: The “1-10-60” Rule

This is the third and final blog in a series presenting the testimony I gave on Nov. 14, 2018, before…

READ MORE
MITRE ATT&CK Evaluation Reveals CrowdStrike Falcon As The Most Effective EDR Solution

MITRE ATT&CK Evaluation Reveals CrowdStrike Falcon as the Most Effective EDR Solution

CrowdStrike delivers the most proactive detections, visibility, and context in MITRE ATT&CK™ Evaluation testing. At CrowdStrike, we believe strongly in…

READ MORE
Farewell To Kelihos And ZOMBIE SPIDER

Farewell to Kelihos and ZOMBIE SPIDER

The Kelihos peer-to-peer botnet was one of the largest and longest-operating cybercrime infrastructures in existence. Its origins can be traced…

READ MORE
CrowdStrike CTO’s Senate Testimony On Countering Nation-State Cyberattacks — Part 2: Cloud Technologies

CrowdStrike CTO’s Senate Testimony on Countering Nation-State Cyberattacks — Part 2: Cloud Technologies

Last week, we published the first part of the testimony I gave on Nov. 14 before the Senate Armed Services…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial