Falcon Product Team
Join CrowdStrike at the Black Hat 2020 Virtual Event
Black Hat 2020 will be a virtual event for the first time in its 23-year history, and CrowdStrike is thrilled to be a Titanium sponsor for this iconic conference. Even though this year’s event is virt[…]
ADP Trusts CrowdStrike Falcon® to Protect Payrolls and Workers Around the World
In this blog, former ADP Staff Vice President and Chief Security Officer Roland Cloutier discusses why ADP chose the CrowdStrike Falcon® platform and explains the powerful advantages the CrowdStrike® […]
The Right Endpoint Detection and Response (EDR) Can Mitigate Silent Failure
In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris Sherman and CrowdStrike Senior Director of Product Marketing C[…]
Address Zero-Day Threats Long Before an Attack Occurs
A recent interview with CrowdStrike VP of Product Marketing Dan Larson, for the CyberWire Daily Podcast, focuses on “zero-day” attacks and how organizations can prepare for these stealthy and damaging[…]
Defining the Value of Machine Learning for Endpoint Protection
Computer Business Review recently published an interview with CrowdStrike® Chief Scientist Dr. Sven Krasser, “Machine learning in cybersecurity: The first line of defense against modern threats,” in w[…]
Why IT Hygiene is Critical to Your Cybersecurity Readiness
Decluttering Your IT “Desk” There is an old adage that claims “a messy desk is the sign of genius.” Although many of us desk jockeys live by this creed, applying the “pile-system” (organization by cre[…]
SANS Institute Reviews CrowdStrike Falcon® Endpoint Protection
SANS Institute analysts have published a review of the CrowdStrike Falcon® platform, offering valuable third-party insight into Falcon capabilities to protect organizations from today’s most dangerous[…]
CrowdStrike Falcon® Prevents WannaCry Ransomware
Blog updated: May 14th In this screenshot example from the Falcon UI, the detection process tree shows that the malicious file associated with WannaCryptor was launched from explorer.exe. The global r[…]
A Primer on Machine Learning in Endpoint Security
Although machine learning (ML) isn’t a new concept — it actually dates back to the origins of the computer itself — it has received more attention lately as cybersecurity vendors increasingly extol it[…]
W-2 Phishing Scam Adds a New Twist to Wire Transfer Fraud
Organizations have long been aware of their vulnerability when it comes to email and yet phishing scams continue to be profitable, as criminal hackers develop more sophisticated methods for thwarting […]
Dark Reading: Why Ransomware Continues to Be a Serious Threat
A recent article on DarkReading.com, titled “4 Reasons Why You Should Take Ransomware Seriously,” outlines the persistence of ransomware as a significant threat to organizations, and explains why it w[…]