Fundamentals of Endpoint Protection
Endpoint protection is becoming increasingly important in today’s world. Want to learn about the fundamental principles of endpoint protection and how CrowdStrike defines them? Then you’ve come to the right place – welcome to Endpoint Protection 101! Browse CrowdStrike’s library of EPP 101 articles to learn about the fundamentals, key trends, and latest insights.
What is a CASB?
CASBs improve an organization’s visibility as to who is accessing their data and how it is being used across endpoints.
What is Privileged Access Management (PAM)?
Learn what privileged access management is, why it is important for businesses, and what you should expect from your PAM solution
History of Ransomware
Ransomware first cropped up around 2005 as just one subcategory of the overall class of scareware. Learn how it's evolved since then.
What is DevSecOps?
DevSecOps—short for Development Security Operations—is the practice of incorporating security continuously throughout the application development lifecycle.
What is an Endpoint?
An endpoint is any device that can be connected to a network. Common examples of endpoints include computers, laptops, mobile phones, tablets and servers.
What is The Dark Web?
The dark web is a subsect of the internet where users can access unindexed web content anonymously through a variety of encryption techniques.
What is Spoofing?
In the cybersecurity world, spoofing is the act of disguising communication or activity from an unknown source and presenting it as a familiar or trusted source.
Distributed Denial-of-Service (DDoS) Attacks Explained
A DDoS attack is the malicious attempt to render a service or a device unavailable by either flooding the resource with traffic or requests or by degrading the resource’s performance substantially.
How to Build a Zero Trust Strategy
In this post, we'll outline a framework for a true Zero Trust model that adheres to industry best practices while specifically avoiding the potential pitfalls.
What is Cybersecurity?
Cybersecurity is the act of defending digital assets, including networks, systems, computers and data, from cyberattacks.
What is Cloud Security Posture Management (CSPM)?
Cloud security posture management (CSPM) automates the identification and remediation of risks across cloud infrastructures.
What are Denial-of-Service (DoS) Attacks?
A Denial-of-Service (DoS) attack is a malicious, targeted attack that floods a network with false requests in order to disrupt business operations.
What is Managed Detection and Response (MDR)?
Learn about what Managed Detection and Response is, whether you need it, how it compares to traditional endpoint protection approaches, and what to ask when considering its implementation.
What is a SOC?
A security operations center, or SOC, is the collective term for the people, processes and technologies responsible for monitoring, analyzing and maintaining an organization’s information security.
What is a Cloud Security Assessment?
A cloud security assessment is an evaluation that tests and analyzes an organization’s cloud infrastructure to ensure the organization is protected from a variety of security risks and threats.
What is Spear-Phishing?
Spear-phishing is a targeted attack that uses fraudulent emails, texts and phone calls in order to steal a specific person's sensitive information.
Red Team vs Blue Team Cybersecurity Simulation Defined
A cybersecurity assessment technique that uses simulated attacks to gauge the strength of the organization’s security capabilities and identify areas of improvement.
What is Cloud Workload Protection?
Cloud Workload Protection platforms offer organizations a solution to continuously monitor for, and remove threats from their cloud workloads and containers.
What is Cyber Threat Intelligence?
Read this article to learn about the three levels of threat intelligence and why it's vital in the fight against breaches.
What is a SIEM in Cybersecurity?
SIEM stands for security information and event management and is a set of tools and services that enable analysts to review log and event data, understand and prepare for threats, and retrieve and report on log data.
What Is Ransomware?
Learn about ransomware, a type of malware that blocks access to files or a system until a ransom is paid.
What is Data Loss Prevention (DLP)?
Data loss prevention (DLP) is an overall security strategy that focuses on detecting and preventing the loss, leakage or misuse of an organization's data.
What is Endpoint Detection and Response?
Learn the true definition of EDR, how it works, and what features to look for when shopping for an EDR solution.
What is Vulnerability Management?
Vulnerability management is the ongoing, regular process of identifying, assessing, reporting on, managing and remediating security risks to keep all systems and assets in a network protected.
What is Container Security?
Container security is the use of security tools and policies to protect containers from threats.
What is Endpoint Security?
Discover the value of endpoint security and the core elements of an effective endpoint security solution.
What is Penetration Testing?
From the benefits and types to the steps and timing, discover the ins and outs of penetration testing.
What is Network Lateral Movement?
Learn what lateral movement is and the three steps you can take to eliminate it.
What is Cyber Threat Hunting?
Read this article to learn about the three approaches to threat hunting, and the steps you should take.
What is a Zero-Day Exploit?
A zero-day exploit is an unknown security vulnerability or software flaw that hackers can specifically target with malicious code.
What is Incident Response & Why You Need a Plan?
Incident response (IR) is the systematic approach taken by an organization to prepare for, detect, contain, and recover from a cybersecurity breach.
What is Mobile Malware?
Mobile malware is malicious software designed to target mobile devices. Click here to read about the different types and distribution methods.
The 11 Most Common Types of Malware
While there are many different variations of malware, there are several types that you are more likely to encounter.
What Is an Advanced Persistent Threat (APT)?
An APT attack is carefully planned and designed to infiltrate a specific organization, evade existing security measures and fly under the radar.
What is Malware (Malicious Software)?
Malware (malicious software) is a term used to describe any program or code that is created with the intent to do harm to a computer, network, or server.
Man in the Middle Attacks: How a MITM Attack Works
A man-in-the-middle (MITM) attack is a type of cyberattack in which a third party infiltrates a conversation between a network user and a web application.
Malware analysis is the process of understanding the behavior and purpose of a suspicious file or URL to help detect and mitigate potential threats.
Phishing Explained: How to identify and prevent phishing attacks
Phishing is a type of cyber attack that email, SMS, phone, or social media to entice a victim to share sensitive information or to download a malicious file that will install a virus on a device.
What is Zero Trust?
Zero Trust is a security concept that requires all users to be authenticated and authorized before being granted access to applications and data.
What is Cloud Security?
Cloud security is the solutions that protect a cloud network, and any service or application hosted within its environment, from cyber threats.