Fundamentals of Endpoint Protection
Endpoint protection is becoming increasingly important in today’s world. Want to learn about the fundamental principles of endpoint protection and how CrowdStrike defines them? Then you’ve come to the right place – welcome to Endpoint Protection 101! Browse CrowdStrike’s library of EPP 101 articles to learn about the fundamentals, key trends, and latest insights.
What is a Cloud Security Assessment?
A cloud security assessment is an evaluation that tests and analyzes an organization’s cloud infrastructure to ensure the organization is protected from a variety of security risks and threats.
What is Spear-Phishing?
Spear-phishing is a targeted attack that uses fraudulent emails, texts and phone calls in order to steal a specific person's sensitive information.
Red Team vs Blue Team Cybersecurity Simulation Defined
A cybersecurity assessment technique that uses simulated attacks to gauge the strength of the organization’s security capabilities and identify areas of improvement.
What is Cloud Workload Protection?
Cloud Workload Protection platforms offer organizations a solution to continuously monitor for, and remove threats from their cloud workloads and containers.
What is Cyber Threat Intelligence?
Read this article to learn about the three levels of threat intelligence and why it's vital in the fight against breaches.
What is a SIEM in Cybersecurity?
SIEM stands for security information and event management and is a set of tools and services that enable analysts to review log and event data, understand and prepare for threats, and retrieve and report on log data.
What Is Ransomware?
Learn about ransomware, a type of malware that blocks access to files or a system until a ransom is paid.
What is a SOC?
A security operations center, or SOC, is the collective term for the people, processes and technologies responsible for monitoring, analyzing and maintaining an organization’s information security.
What is Data Loss Prevention (DLP)?
Data loss prevention (DLP) is an overall security strategy that focuses on detecting and preventing the loss, leakage or misuse of an organization's data.
What is Endpoint Detection and Response?
Learn the true definition of EDR, how it works, and what features to look for when shopping for an EDR solution.
What is Vulnerability Management?
Vulnerability management is the ongoing, regular process of identifying, assessing, reporting on, managing and remediating security risks to keep all systems and assets in a network protected.
What is Endpoint Security?
Discover the value of endpoint security and the core elements of an effective endpoint security solution.
What is Penetration Testing?
From the benefits and types to the steps and timing, discover the ins and outs of penetration testing.
What is Network Lateral Movement?
Learn what lateral movement is and the three steps you can take to eliminate it.
What is Cyber Threat Hunting?
Read this article to learn about the three approaches to threat hunting, and the steps you should take.
What is a Zero-Day Exploit?
A zero-day exploit is an unknown security vulnerability or software flaw that hackers can specifically target with malicious code.
What is Incident Response & Why You Need a Plan?
Incident response (IR) is the systematic approach taken by an organization to prepare for, detect, contain, and recover from a cybersecurity breach.
What is Mobile Malware?
Mobile malware is malicious software designed to target mobile devices. Click here to read about the different types and distribution methods.
The 11 Most Common Types of Malware
While there are many different variations of malware, there are several types that you are more likely to encounter.
What Is an Advanced Persistent Threat (APT)?
An APT attack is carefully planned and designed to infiltrate a specific organization, evade existing security measures and fly under the radar.
What is Malware (Malicious Software)?
Malware (malicious software) is a term used to describe any program or code that is created with the intent to do harm to a computer, network, or server.
Man-in-the-Middle (MITM) Attacks Explained
A man-in-the-middle (MITM) attack is a type of cyberattack in which a third party infiltrates a conversation between a network user and a web application.
Malware analysis is the process of understanding the behavior and purpose of a suspicious file or URL to help detect and mitigate potential threats.
Phishing Explained: How to identify and prevent phishing attacks
Phishing is a type of cyber attack that email, SMS, phone, or social media to entice a victim to share sensitive information or to download a malicious file that will install a virus on a device.
What is Zero Trust?
Zero Trust is a security concept that requires all users to be authenticated and authorized before being granted access to applications and data.
What is Cloud Security?
Cloud security is the solutions that protect a cloud network, and any service or application hosted within its environment, from cyber threats.