X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Mac Attacks Along The Kill Chain: Credential Theft [VIDEO]

Mac Attacks Along the Kill Chain: Credential Theft [VIDEO]

  This blog is the third in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I…

FULL ARTICLE
Mac Attacks Along The Kill Chain: Part 2 — Privilege Escalation [VIDEO]

Mac Attacks Along the Kill Chain: Part 2 — Privilege Escalation [VIDEO]

  This blog is the second in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I…

FULL ARTICLE
Mac Attacks Along The Kill Chain: Part 1 — Delivery Using URL Schemes [VIDEO]

Mac Attacks Along the Kill Chain: Part 1 — Delivery Using URL Schemes [VIDEO]

As a senior research developer with the Falcon OverWatch managed hunting team, I joined CrowdStrike co-founders, CEO George Kurtz and…

FULL ARTICLE
ADP Trusts CrowdStrike Falcon To Protect Payrolls And Workers Around The World [VIDEO]

ADP Trusts CrowdStrike Falcon to Protect Payrolls and Workers Around the World [VIDEO]

In this video, ADP Staff Vice President and Chief Security Officer Roland Cloutier explains why ADP chose the CrowdStrike Falcon…

FULL ARTICLE
Greenhill Uses CrowdStrike To Maintain Solid Protection With Limited Internal Resources [VIDEO]

Greenhill Uses CrowdStrike to Maintain Solid Protection With Limited Internal Resources [VIDEO]

Greenhill and Co. is a leading independent investment bank and financial advisory firm with 15 offices worldwide. As a mid-market…

FULL ARTICLE
Helping Non-Security Stakeholders Understand ATT&CK In 10 Minutes Or Less [VIDEO]

Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO]

\ CrowdStrike® Falcon® detections now align with the MITRE ATT&CK™ framework, a valuable tool that provides consistent, industry-standard terminology for…

FULL ARTICLE
Analyzing Targeted Intrusions Through The ATT&CK Framework Lens  [VIDEO]

Analyzing Targeted Intrusions Through the ATT&CK Framework Lens [VIDEO]

The security community is quickly adopting the MITRE ATT&CK framework as a standard way to categorize adversary intrusion behavior. However,…

FULL ARTICLE
Qatar’s Commercial Bank Chooses CrowdStrike Falcon: A Partnership Based On Trust [VIDEO]

Qatar’s Commercial Bank Chooses CrowdStrike Falcon: A Partnership Based on Trust [VIDEO]

Since its inception as Qatar’s first private bank in 1974, Commercial Bank has forged a reputation for growth and innovation…

FULL ARTICLE
Endpoint Protection And Threat Intelligence: The Way Forward  [VIDEO]

Endpoint Protection and Threat Intelligence: The Way Forward [VIDEO]

I’m excited to tell you about CrowdStrike’s 2018 Summer Release, in particular, how we’ve expanded our automated threat intelligence solution,…

FULL ARTICLE
CrowdStrike CTO Explains “Breakout Time” —  A Critical Metric In Stopping Breaches [VIDEO]

CrowdStrike CTO Explains “Breakout Time” — A Critical Metric in Stopping Breaches [VIDEO]

This video features CrowdStrike® Co-founder and CTO Dmitri Alperovitch discussing why “breakout time” is a critical measurement for organizations trying…

FULL ARTICLE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial