- CYBERSECURITY IN THE TIME OF COVID-19
- View Our Resource Hub
Fundamentals of Endpoint Protection
Endpoint protection is becoming increasingly important in today’s world. Want to learn about the fundamental principles of endpoint protection and how CrowdStrike defines them? Then you’ve come to the right place – welcome to Endpoint Protection 101! Browse CrowdStrike’s library of EPP 101 articles to learn about the fundamentals, key trends, and latest insights.
What Is Ransomware & How to Prevent It?
Learn about ransomware, a type of malware that blocks access to files or a system until a ransom is paid.
What is Endpoint Detection and Response?
Learn the true definition of EDR, how it works, and what features to look for when shopping for an EDR solution.
What is Endpoint Security?
Discover the value of endpoint security and the core elements of an effective endpoint security solution.
What is Cyber Threat Intelligence?
Read this article to learn about the three levels of threat intelligence and why it's vital in the fight against breaches.
What is Penetration Testing?
From the benefits and types to the steps and timing, discover the ins and outs of penetration testing.
What is Network Lateral Movement?
Learn what lateral movement is and the three steps you can take to eliminate it.
What is Cyber Threat Hunting?
Read this article to learn about the three approaches to threat hunting, and the steps you should take.
What is a Zero-Day Exploit?
A zero-day exploit is an unknown security vulnerability or software flaw that hackers can specifically target with malicious code.
What is Incident Response & Why You Need a Plan?
Incident response (IR) is the systematic approach taken by an organization to prepare for, detect, contain, and recover from a cybersecurity breach.
What is Mobile Malware?
Mobile malware is malicious software designed to target mobile devices. Click here to read about the different types and distribution methods.
The 11 Most Common Types of Malware
While there are many different variations of malware, there are several types that you are more likely to encounter.
What Is an Advanced Persistent Threat?
An APT attack is carefully planned and designed to infiltrate a specific organization, evade existing security measures and fly under the radar.
What is Malware (Malicious Software)?
Malware (malicious software) is a term used to describe any program or code that is created with the intent to do harm to a computer, network, or server.
What is an MITM Attack?
A man-in-the-middle (MITM) attack is a type of cyberattack in which a third party infiltrates a conversation between a network user and a web application.