News Archive | Media on CrowdStrike

News

18-Mar-2024 | SiliconANGLE

Article icon

CrowdStrike and Nvidia form strategic partnership to enhance cybersecurity with AI

18-Mar-2024 | CNBC

Article icon

When it comes to powering AI, AI is the engine and data is the oil: CrowdStrike CEO George Kurtz

18-Mar-2024 | CNBC

Article icon

CrowdStrike CEO George Kurtz goes one-on-one with Jim Cramer

18-Mar-2024 | CNBC

Article icon

CrowdStrike CEO on why his company is partnering with Nvidia: ‘We’ve got the data, they’ve got the power and the software’

11-Mar-2024 | CRN

Article icon

CrowdStrike CEO George Kurtz On Microsoft’s ‘Murky’ Breach Details, Palo Alto Networks Platform Debate

9-Mar-2024 | SiliconANGLE

Article icon

Why CrowdStrike is separating from the cybersecurity pack

8-Mar-2024 | Fox Business: The Claman Countdown

Article icon

CrowdStrike CEO: Microsoft hack is an issue of national security

8-Mar-2024 | Forbes

Article icon

Who Is Midnight Blizzard? Russian-Linked Group Has Repeatedly Targeted Microsoft, Company Says

8-Mar-2024 | Security Boulevard

Article icon

CrowdStrike Extends Scope and Reach of Cybersecurity Portfolio

7-Mar-2024 | Yahoo Finance

Article icon

CrowdStrike CEO on AI’s impact on cybersecurity demand

6-Mar-2024 | BankInfoSecurity

Article icon

George Kurtz: There's a Difference Between Price, Total Cost

6-Mar-2024 | CNBC

Article icon

Cramer’s Mad Dash: CrowdStrike

6-Mar-2024 | Forbes

Article icon

CrowdStrike’s Earnings Beat & Market Expanding Flow Acquisition

6-Mar-2024 | Cybersecurity Dive

Article icon

CrowdStrike dodges pricing war with Palo Alto Networks

6-Mar-2024 | SDxCentral

Article icon

CrowdStrike showcases wins over Palo Alto Networks and Microsoft, acquires Flow Security

6-Mar-2024 | CNBC Mad Money

Article icon

CrowdStrike CEO George Kurtz goes one-on-one with Jim Cramer

6-Mar-2024 | CNBC

Article icon

CrowdStrike CEO says cybercriminals are leveling up: ‘It’s going to be the battle of AI in the future’

5-Mar-2024 | SDxCentral

Article icon

Dell taps CrowdStrike XDR for MDR

5-Mar-2024 | VentureBeat

Article icon

CrowdStrike and Dell unleash an AI-powered, unified security vision

5-Mar-2024 | CNBC

Article icon

CrowdStrike shares surge on earnings beat, strong full-year guidance

5-Mar-2024 | Bloomberg

Article icon

CrowdStrike Posts Earnings Beat on Cyber Demand, Shares Soar

5-Mar-2024 | CRN

Article icon

CrowdStrike To Acquire Data Security Startup, Boosts Guidance

5-Mar-2024 | SiliconANGLE

Article icon

CrowdStrike caps earnings surge with Flow Security acquisition

5-Mar-2024 | BankInfoSecurity

Article icon

CrowdStrike to Buy Israeli Data Defense Vendor Flow Security

5-Mar-2024 | SecurityWeek

Article icon

CrowdStrike to Acquire Flow Security

26-Feb-2024 | TechRepublic

Article icon

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

26-Feb-2024 | CIO Dive

Article icon

Cloud intrusions spiked 75% in 2023, CrowdStrike says

26-Feb-2024 | MSNBC: Andrea Mitchell

Article icon

Chief Security Officer: People must ‘validate the sources of their information’ during 2024 election

23-Feb-2024 | Cybersecurity Dive

Article icon

Cloud intrusions spiked 75% in 2023, CrowdStrike says

22-Feb-2024 | CSO Online

Article icon

Identity hacking saw sharp rise 2023

22-Feb-2024 | MeriTalk

Article icon

CrowdStrike Sees Attacks, Election Influence Attempts Rising

22-Feb-2024 | Fortune

Article icon

Cyber attacks are the No. 1 worry for business leaders—and AI may be able to help

22-Feb-2024 | Government Technology

Article icon

Global Cyber Threat Report Spotlights Cloud Abuse, Cyber Extortion

22-Feb-2024 | Cyberscoop: Safe Mode Podcast

Article icon

LockBit’s very bad day; Adam Meyers on Israel-Gaza cyber ops

22-Feb-2024 | HelpNetSecurity

Article icon

Attack velocity surges with average breakout time down to only 62 minutes

22-Feb-2024 | SC Magazine

Article icon

Accelerated cyberattack velocity, mounting cloud attacks reported

21-Feb-2024 | SDxCentral

Article icon

CrowdStrike reports jaw-dropping cyberattack breakout speed

21-Feb-2024 | The Register

Article icon

Orgs are having a major identity crisis while crims reap the rewards

21-Feb-2024 | NextGov

Article icon

Russian information operations to likely increase in 2024 amid global election activity, CrowdStrike says

21-Feb-2024 | BetaNews

Article icon

Cyberattacks follow businesses to the cloud

21-Feb-2024 | Inside Cybersecurity

Article icon

CrowdStrike annual threat report finds increased attacks on cloud environments by malicious actors

21-Feb-2024 | Dark Reading

Article icon

Iranian APTs Dress Up As Hacktivists for Disruption, Influence Ops

21-Feb-2024 | TechTarget

Article icon

CrowdStrike Global Threat Report: Cloud intrusions up 75%

21-Feb-2024 | Venture Beat

Article icon

The Five Most Alarming Cyber Threats from CrowdStrike's 2024 Global Threat Report

21-Feb-2024 | Silicon Angle

Article icon

CrowdStrike warns of surge in adversaries using stolen credentials to exploit cloud environments

21-Feb-2024 | CRN

Article icon

5 Big Things To Know From CrowdStrike’s 2024 Threat Report

21-Feb-2024 | Security Magazine

Article icon

Report: Average breakout time for intrusive activity is 62 minutes

21-Feb-2024 | Marca (Spain)

Article icon

Cybercriminals only need 3 minutes to achieve their objectives: How could you avoid it?

21-Feb-2024 | The Independent (UK)

Article icon

Generative AI and elections are key focus for hackers in 2024, report warns

21-Feb-2024 | Süddeutsche Zeitung (Germany)

Article icon

Targeted by state hackers and criminals

21-Feb-2024 | Time

Article icon

Hackers Could Use ChatGPT to Target 2024 Elections

21-Feb-2024 | ZDNet

Article icon

Cybercriminals are using Meta's Llama 2 AI, according to CrowdStrike

21-Feb-2024 | Channel Futures

Article icon

CrowdStrike, SonicWall Cyber Threat Reports Highlight Attacks, Popular Tactics

20-Feb-2024 | Forbes

Article icon

Harnessing The Power Of AI For Cybersecurity

15-Feb-2024 | SecurityWeek

Article icon

No Security Scrutiny for Half of Major Code Changes: AppSec Survey

13-Feb-2024 | Forbes

Article icon

Stepping Safely Through The Software Sprawl

13-Feb-2024 | CSO Online

Article icon

Tool sprawl is hurting application security, US CSOs say

9-Feb-2024 | CRN

Article icon

Partners: CrowdStrike’s Wild West Super Bowl Ad Is Brilliant

8-Feb-2024 | The Hacker News

Article icon

HijackLoader Evolves: Researchers Decode the Latest Evasion Methods

8-Feb-2024 | Forbes

Article icon

Tackling Cyber Threats: The Genius Behind CrowdStrike’s Super Bowl Ad

8-Feb-2024 | Brand Innovators

Article icon

CrowdStrike returns to Super Bowl with Wild West-themed spot

8-Feb-2024 | SC Media

Article icon

New HijackLoader variant evades detection, enhances persistence

8-Feb-2024 | Ad Age

Article icon

Super Bowl Alert: Verizon's Beyonce Tease, Kia’s Tear Jerker, CrowdStrike’s Bot Attack and Doritos' Giant Chip

8-Feb-2024 | Reel 360

Article icon

CrowdStrike unveils epic Super Bowl ad: “The Future”

7-Feb-2024 | Security Boulevard

Article icon

The 8 Must Haves for the Next Generation of SIEM

6-Feb-2024 | Small Business Currents

Article icon

5 Reasons Nonprofits Are a Target (and What They Need to Know About Cybersecurity)

6-Feb-2024 | FedTech

Article icon

Federal Agencies Struggle on Cybersecurity Logging Benchmarks

5-Feb-2024 | CRN

Article icon

2024 Channel Chiefs: The 50 Most Influential

1-Feb-2024 | CNBC Money Movers

Article icon

CrowdStrike CEO: FBI warning shows serious nature of cyber threats from China

1-Feb-2024 | Ad Age

Article icon

Watch CrowdStrike's Super Bowl Teaser, Set in the Wild West

25-Jan-2024 | IT Brew

Article icon

Ransomware simulators reveal ‘eye-opening’ weaknesses

23-Jan-2024 | CRN

Article icon

CrowdStrike CEO: Microsoft Explanation For Russia Hack Doesn’t Add Up

22-Jan-2024 | Politico

Article icon

Microsoft under the microscope

22-Jan-2024 | Cybersecurity Dive

Article icon

Microsoft to overhaul internal security practices after Midnight Blizzard attack

22-Jan-2024 | BankInfoSecurity

Article icon

Microsoft's Latest Hack Sparks Major Security Concerns

22-Jan-2024 | CNBC

Article icon

CrowdStrike CEO talks Microsoft’s security breach and explains why Russian hackers are hard to beat

22-Jan-2024 | CNBC Mad Money

Article icon

Crowdstrike CEO George Kurtz on Microsoft hack and what it means for cybersecurity landscape

11-Jan-2024 | CNBC Closing Bell Overtime

Article icon

Crowdstrike CEO on 'dark AI': You're going to see more cybercrime happening quicker than ever before

9-Jan-2024 | SC Media

Article icon

Five ways to develop better, safer apps

5-Jan-2024 | The Register

Article icon

Russia's Sandworm blamed for Kyivstar telecom cyberattack

3-Jan-2024 | Bloomberg

Article icon

Generative AI Leads to More Cyber Crime, Says CrowdStrike CEO

2-Jan-2024 | CBS News

Article icon

Cybersecurity expert says advancements in AI will increase cyber threats in 2024

29-Dec-2023 | VentureBeat

Article icon

Why training LLMs with endpoint data will strengthen cybersecurity

28-Dec-2023 | VentureBeat

Article icon

Why attackers love to target misconfigured clouds and phones

21-Dec-2023 | CNBC

Article icon

Ransomware gangs are now reporting to the SEC, says CrowdStrike CEO

21-Dec-2023 | MSNBC

Article icon

Henry: ‘Generative A.I. is going to change the face of the 2024 election’

20-Dec-2023 | Forbes

Article icon

How CrowdStrike Is Navigating Risks And Ethics For Its Generative AI

19-Dec-2023 | Forbes

Article icon

Chief Security Officer Of CrowdStrike Shares His Approach To Cyberattacks

18-Dec-2023 | CRN

Article icon

Optiv Hits $1 Billion In Sales With CrowdStrike: ‘We’re Both Hungry’

15-Dec-2023 | Yahoo Finance

Article icon

New SEC cyber rules: Everything you need to know

14-Dec-2023 | The Washington Post

Article icon

New SEC cyber rules are about to go into effect. Expect some bumps.

14-Dec-2023 | CNBC

Article icon

CrowdStrike CEO George Kurtz on China, Microsoft and the SEC

14-Dec-2023 | Yahoo Finance

Article icon

Why 'dark AI' is a top cybersecurity concern for 2024

12-Dec-2023 | InformationWeek

Article icon

What CISOs Need to Know About Nation-State Actors

12-Dec-2023 | SiliconANGLE

Article icon

Fortifying cybersecurity for SMBs: The Dell-CrowdStrike partnership unpacked

12-Dec-2023 | Dark Reading

Article icon

Debate Roils Over Extent of Nation-State Cyber Involvement in Gaza

11-Dec-2023 | Enterprise Security Tech

Article icon

CrowdStrike CTO: AI Blind Spots and Unsanctioned Tools - Security Risks to Watch in 2024

8-Dec-2023 | Yahoo Finance

Article icon

3M unfilled cybersecurity jobs 'a problem': CrowdStrike CEO

8-Dec-2023 | InformationWeek

Article icon

Another Cyberattack on Critical Infrastructure and the Outlook on Cyberwarfare

7-Dec-2023 | BankInfoSecurity

Article icon

Lessons in Threat Detection for Insider Threats

5-Dec-2023 | StateTechMagazine

Article icon

Embracing the Whole-of-State Approach to Cybersecurity

29-Nov-2023 | CNBC Mad Money

Article icon

CrowdStrike CEO George Kurtz goes one-on-one with Jim Cramer

28-Nov-2023 | CRN

Article icon

CrowdStrike Finding Huge Demand For ‘Replacing Legacy SIEM’: CEO George Kurtz

21-Nov-2023 | SC Media

Article icon

The Biden EO on AI: A stepping stone to the cybersecurity benefits of AI

20-Nov-2023 | Small Business Currents

Article icon

How AI is Revolutionizing Cybersecurity for SMBs

19-Nov-2023 | Security Boulevard

Article icon

CrowdStrike Extends AI Approach to Cybersecurity to SMBs

16-Nov-2023 | CSO Online

Article icon

CrowdStrike’s new Falcon Go delivers AI security to SMBs

15-Nov-2023 | Forbes

Article icon

CrowdStrike Changes The Game For SMB Cybersecurity With Falcon Go

15-Nov-2023 | CRN

Article icon

CrowdStrike’s New Version For SMBs: 5 Things To Know

9-Nov-2023 | Dark Reading

Article icon

Imperial Kitten APT Claws at Israeli Industry with Multiyear Spy Effort

9-Nov-2023 | Forbes

Article icon

Imperial Kitten Strikes: CrowdStrike Uncovers New Cyberthreats To Israeli Sectors

1-Nov-2023 | VentureBeat

Article icon

Las Vegas CIO doubles down on AI and endpoint security to protect Sin City

31-Oct-2023 | The New York Times

Article icon

In Cyberattacks, Iran Shows Signs of Improved Hacking Capabilities

31-Oct-2023 | Dark Reading

Article icon

20 Years Later, Is Patch Tuesday Enough?

27-Oct-2023 | Dark Reading

Article icon

What the Bionic Acquisition Can Bring to CrowdStrike

25-Oct-2023 | CRN

Article icon

CrowdStrike CBO Daniel Bernard On Surging AWS Marketplace Growth With Partners

29-Sep-2023 | SC Media

Article icon

CrowdStrike’s Tina Thorstenson: The TTP’s for women and career success

25-Sep-2023 | CRN

Article icon

The 100 People You Don’t Know But Should 2023

22-Sep-2023 | SiliconANGLE

Article icon

The CrowdStrike journey: Putting the pedal to the metal on cybersecurity innovation

22-Sep-2023 | SiliconANGLE

Article icon

Pax8 and CrowdStrike partner to offer vital cybersecurity services to SMBs

22-Sep-2023 | SiliconANGLE

Article icon

Effectively addressing security challenges through visibility, trust and actionable data

22-Sep-2023 | SiliconANGLE

Article icon

CrowdStrike adapts frontline defense against escalating cyberattacks and extortion

22-Sep-2023 | SiliconANGLE

Article icon

Dig Security aims to protect data where it lives in a sea of cloud platforms

22-Sep-2023 | The New Stack

Article icon

3 Tips to Secure Your Cloud Infrastructure and Workloads

22-Sep-2023 | SiliconANGLE

Article icon

Tackling endpoint’s common attack vector: How Navan uses CrowdStrike EDR

22-Sep-2023 | SiliconANGLE

Article icon

CrowdStrike innovates with AI to outmaneuver cyber adversaries

22-Sep-2023 | SiliconANGLE

Article icon

Balancing AI and partnership: Salesforce’s strategy for securing the cloud

21-Sep-2023 | Forbes

Article icon

Fal.Con 2023: CrowdStrike Surges Ahead With Groundbreaking Innovations

21-Sep-2023 | VentureBeat

Article icon

CrowdStrike defines a strong vision for generative AI at Fal.Con 2023

21-Sep-2023 | CRN

Article icon

CrowdStrike’s 8 Biggest Announcements At Fal.Con 2023

21-Sep-2023 | SiliconANGLE

Article icon

The realities of modern cybersecurity: CrowdStrike CSO weighs in on how businesses must adapt

21-Sep-2023 | SiliconANGLE

Article icon

A decade of cybersecurity evolution: CrowdStrike’s latest innovations revealed

21-Sep-2023 | SiliconANGLE

Article icon

Strengthening cybersecurity: Dell, Intel and CrowdStrike’s hardware-assisted security partnership

21-Sep-2023 | SiliconANGLE

Article icon

A deep dive into the trends shaping the future of cybersecurity: theCUBE analyst insights from Fal.Con

21-Sep-2023 | SiliconANGLE

Article icon

From burnout to breakthrough: How managed detection and response elevates the security analyst experience

21-Sep-2023 | SC Media

Article icon

Congratulations to our 2023 SC Media Women in IT Security honorees

20-Sep-2023 | CRN

Article icon

Partners: CrowdStrike Acquiring Bionic Is A Cloud Security Win

20-Sep-2023 | CRN

Article icon

CrowdStrike Execs: Massive Partner Opportunity On Identity Protection, Cloud Security, Next-Gen SIEM

20-Sep-2023 | Cybersecurity Insiders

Article icon

CrowdStrike acquires Bionic

20-Sep-2023 | TechRepublic

Article icon

CrowdStrike Fal.Con 2023: CrowdStrike Brings AI and Cloud Application Security to Falcon

20-Sep-2023 | SiliconANGLE

Article icon

CrowdStrike’s evolution in counter-adversary operations: Enhancing security in the era of rapid threats

20-Sep-2023 | CRN

Article icon

10 Coolest Cybersecurity Products At CrowdStrike Fal.Con 2023

20-Sep-2023 | Fortt Knox (Podcast)

Article icon

George Kurtz, Crowdstrike CEO at Fal.Con 2023: Bionic Acquisition

20-Sep-2023 | MSSP Alert

Article icon

Zscaler, Imprivata and CrowdStrike Partner to Protect Healthcare

20-Sep-2023 | SiliconANGLE

Article icon

CrowdStrike’s new tools to prioritize cyberthreats: theCUBE’s Fal.Con day 2 keynote analysis

20-Sep-2023 | SC Media

Article icon

Bionic.ai purchase, new cyber defense tools announced by CrowdStrike

20-Sep-2023 | SiliconANGLE

Article icon

CrowdStrike eyes generative AI to revolutionize cybersecurity: A one-on-one with president Mike Sentonas

20-Sep-2023 | SiliconANGLE

Article icon

Inside Charlotte AI’s monetization strategy: theCUBE analysts weigh in

19-Sep-2023 | CSO Online

Article icon

CrowdStrike announces major build-out of its Falcon product suite

19-Sep-2023 | Security Boulevard

Article icon

CrowdStrike Extends Scope of Managed Cybersecurity Services

19-Sep-2023 | SiliconANGLE

Article icon

CrowdStrike adds new cybersecurity protective tools - and Bionic.ai - to its Falcon lineup

19-Sep-2023 | SiliconANGLE

Article icon

CrowdStrike CEO George Kurtz on transforming cybersecurity with AI and a comprehensive cloud stack

19-Sep-2023 | CRN

Article icon

5 Big Takeaways From CrowdStrike’s 2023 Partner Summit

19-Sep-2023 | TechCrunch

Article icon

CrowdStrike confirms its Bionic.ai acquisition, sources say for $350M

19-Sep-2023 | CRN

Article icon

George Kurtz’s 5 Boldest Statements At CrowdStrike Fal.Con 2023

19-Sep-2023 | CRN

Article icon

CrowdStrike To Acquire Bionic To Boost Cloud-Native App Security

19-Sep-2023 | ChannelFutures

Article icon

CrowdStrike Buying Bionic for Application Security Posture Management

19-Sep-2023 | MSSP Alert

Article icon

CrowdStrike Buys App Security Company Bionic

19-Sep-2023 | SecurityWeek

Article icon

CrowdStrike to Acquire Application Intelligence Startup Bionic

19-Sep-2023 | Clayton County Register

Article icon

CrowdStrike Acquires Israeli Cybersecurity Startup Bionic

19-Sep-2023 | BankInfoSecurity

Article icon

CrowdStrike to Buy AppSec Startup Bionic for Reported $350M

18-Sep-2023 | MSSP Alert

Article icon

CrowdStrike Unveils MSSP/MSP Partner Program, Marketplace

18-Sep-2023 | ChannelFutures

Article icon

CrowdStrike Fal.Con 2023: Company Overhauls Partner Program, Intros New Marketplace

18-Sep-2023 | CRN

Article icon

CrowdStrike CEO George Kurtz: Microsoft’s ‘Failures’ Put Everyone At Risk

18-Sep-2023 | CRN

Article icon

CrowdStrike Widens Its Strike Zone With ‘Something Better’ For SMB Security

18-Sep-2023 | CRN

Article icon

CrowdStrike Debuts Accelerate Partner Program With Improved Incentives, Training, Marketing Support

18-Sep-2023 | StateTech Magazine

Article icon

State and Local Agencies Can Adopt a Layered Approach to Hybrid Cloud Security

14-Sep-2023 | MSSP Alert

Article icon

Elevate and CrowdStrike Team Up for Human Risk Management

13-Sep-2023 | MSSP Alert

Article icon

CrowdStrike Opens New MDR Program for Service Providers

12-Sep-2023 | CRN

Article icon

5 Big CrowdStrike Moves For MSPs And MSSPs

7-Sep-2023 | Yahoo! Finance

Article icon

How CrowdStrike plans to use AI to 'revolutionize security'

6-Sep-2023 | CNBC Mad Money

Article icon

CrowdStrike CEO George Kurtz: We started talking about AI before it was fashionable

1-Sep-2023 | The New Stack

Article icon

Common Cloud Misconfigurations That Lead to Data Breaches

30-Aug-2023 | TechTarget

Article icon

CrowdStrike CTO: 'Rookie mistakes' are hurting cloud security

16-Aug-2023 | SDxCentral

Article icon

CrowdStrike CTO explains adversaries’ focus on identity amid skyrocketing attacks

15-Aug-2023 | Cybersecurity Dive

Article icon

How disjoined threat intelligence limits companies — and what to do about it

14-Aug-2023 | ITPro

Article icon

Stealthy Kerberoasting attacks surge and lend support to latest ransomware trend

10-Aug-2023 | Forbes

Article icon

CrowdStrike: Microsoft Is Failing At Security

10-Aug-2023 | TechRepublic

Article icon

CrowdStrike at BlackHat: Speed, Interaction, Sophistication of Threat Actors Rising in 2023

9-Aug-2023 | Dark Reading

Article icon

Adam Meyers interviewed on Threat Hunting Report

9-Aug-2023 | Security Boulevard

Article icon

CrowdStrike Launches Managed Service Focused on Protecting Credentials

8-Aug-2023 | CRN

Article icon

5 Big CrowdStrike Updates On Threat Hunting And Intel

8-Aug-2023 | MSNBC

Article icon

China hacking Japan’s defense network could be part of a sweeping ‘espionage 101 campaign

8-Aug-2023 | SC Media

Article icon

Identity-based attacks now part of most ‘hands on keyboard’ cyber intrusions

8-Aug-2023 | SiliconANGLE

Article icon

CrowdStrike debuts Counter Adversary Operations and releases 2023 Threat Hunting Report

8-Aug-2023 | TechTarget

Article icon

CrowdStrike observes massive spike in identity-based attacks

24-Jul-2023 | SiliconANGLE

Article icon

Solving cybersecurity complexities in multicloud deployments

24-Jul-2023 | SiliconANGLE

Article icon

Three insights you might have missed from the Supercloud 3 event

18-Jul-2023 | SiliconANGLE

Article icon

CrowdStrike embraces AI and machine learning for protecting businesses in the cloud

14-Jul-2023 | Security Boulevard

Article icon

3 Ways to Build a Stronger Approach to Identity Protection

14-Jul-2023 | The Washington Post

Article icon

Analysis | What we know (and don’t know) about the government email breach

12-Jul-2023 | Associated Press

Article icon

Chinese hackers breached State Dept., other government email on eve of Blinken visit, officials say

12-Jul-2023 | The Washington Post

Article icon

Chinese hackers breach email of Commerce Secretary Raimondo and State Department officials

11-Jul-2023 | The Washington Post

Article icon

What secretaries of state are saying about a judge’s social media order

7-Jul-2023 | Australian Financial Review

Article icon

Hackers ‘weaponising’ data theft to shake down business

27-Jun-2023 | Dark Reading

Article icon

China's 'Volt Typhoon' APT Turns to Zoho ManageEngine for Fresh Cyberattacks

26-Jun-2023 | The Hacker News

Article icon

Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks

23-Jun-2023 | DevOps.com

Article icon

How to Empower DevSecOps in a Complex Multi-Cloud Landscape

19-Jun-2023 | ExecutiveGov

Article icon

CrowdStrike CSO & Former FBI Exec Joins CLEAR’s Board of Directors

16-Jun-2023 | The New Stack

Article icon

First-Ever Dero Cryptojacking Targets Kubernetes Infrastructure

14-Jun-2023 | EdTech Magazine

Article icon

Review: CrowdStrike Falcon Insight EDR Helps Schools Soar Against Endpoint Threats

13-Jun-2023 | CNBC Closing Bell Overtime

Article icon

Crowdstrike CEO George Kurtz: New A.I. tool ‘Charlotte’ acts as a ‘virtual security analyst’

9-Jun-2023 | VentureBeat

Article icon

Why attackers love to target IoT devices

6-Jun-2023 | SiliconANGLE

Article icon

CrowdStrike adds more cybersecurity features for protecting cloud environments

2-Jun-2023 | SiliconANGLE

Article icon

AI vs. adversaries: How machine-leveraged attacks drive the need for advanced security

2-Jun-2023 | CRN

Article icon

CrowdStrike Exec On New Pax8 Partnership: MSP Market Is The ‘Next Foray’ For Growth

2-Jun-2023 | Bloomberg Technology

Article icon

CrowdStrike Bets on AI with AWS Partnership

1-Jun-2023 | Cybersecurity Dive

Article icon

CrowdStrike adds threat data to generative AI push

1-Jun-2023 | VentureBeat

Article icon

VentureBeat Q&A: CrowdStrike’s Michael Sentonas on importance of unifying endpoint and identity security

1-Jun-2023 | ChannelE2E

Article icon

Pax8, CrowdStrike Partnership Adds Cybersecurity Options for MSPs

1-Jun-2023 | CNBC Mad Money

Article icon

CrowdStrike CEO George Kurtz goes one-on-one with Jim Cramer

1-Jun-2023 | CNBC

Article icon

CrowdStrike CEO calls generative AI an ‘arms race,’ but says company is positioned well to face adversaries

1-Jun-2023 | Channel Futures

Article icon

Strategic Partnership Between Pax8, CrowdStrike Advances Cybersecurity for MSPs

31-May-2023 | SiliconANGLE

Article icon

CrowdStrike debuts generative AI cybersecurity chatbot and new AWS integrations

30-May-2023 | SDxCentral

Article icon

CrowdStrike’s new generative AI tool combines machine and human data

30-May-2023 | MSSP Alert

Article icon

CrowdStrike Unveils Generative AI Cybersecurity Analyst

30-May-2023 | Axios

Article icon

CrowdStrike introduces generative AI assistant into its security programs

26-May-2023 | VentureBeat

Article icon

How Inductive Automation’s endpoint security strategy makes manufacturing more secure

25-May-2023 | Security Boulevard

Article icon

It’s Time to Reevaluate Your Enterprise Remediation Strategy

22-May-2023 | SDxCentral

Article icon

Forrester: Top 3 tips for choosing an MDR vendor

18-May-2023 | CRN

Article icon

10 MDR Security Companies Making Moves In 2023 (So Far)

17-May-2023 | VentureBeat

Article icon

Predicting the future of endpoint security in a zero-trust world

17-May-2023 | Forbes

Article icon

Some Of Russia’s Most Dangerous Cybercriminals Just Had Their Malware Dealer Unmasked

12-May-2023 | The CyberWire

Article icon

Adam Meyers from CrowdStrike is discussing findings from their 2023 CrowdStrike Global Threat Report.

10-May-2023 | MSSP Alert

Article icon

Vanta Expands CrowdStrike Partnership, Announces New Integration

9-May-2023 | SC Media

Article icon

CrowdStrike unveils ChromeOS support for XDR tool

9-May-2023 | The CyberWire

Article icon

State-sponsored and state-promoted cyber campaigns. A look at Royal ransomware. A new wave of BEC. Man-in-the-middle attacks rising.

8-May-2023 | HealthSystemCIO

Article icon

Partner Perspective: Willingness to Disrupt Status Quo is Key to CISO Success

5-May-2023 | SiliconANGLE

Article icon

Stopping cloud breaches: CrowdStrike combines agent-based and agentless methods to ensure data security

5-May-2023 | SiliconANGLE

Article icon

Analyzing the threat of adversarial AI in the wake of ChatGPT’s explosion

4-May-2023 | SiliconANGLE

Article icon

Data choice and control play strong roles in how Cribl and CrowdStrike provide security solutions

4-May-2023 | TechStrong TV

Article icon

Raj Rajamani, CrowdStrike | RSA Conference 2023

3-May-2023 | BankInfoSecurity

Article icon

XDR for ChromeOS: What Does It Mean for the Cyber Industry?

2-May-2023 | TechTarget

Article icon

CrowdStrike focuses on ChromeOS security, rising cloud threats

2-May-2023 | Wired

Article icon

SolarWinds: The Untold Story of the Boldest Supply-Chain Hack

1-May-2023 | CRN

Article icon

10 Cybersecurity Companies Making Moves: April 2023

30-Apr-2023 | The Register

Article icon

RSA Conference or Black Mirror? Either way, we're doomed ... probably

26-Apr-2023 | Dark Reading

Article icon

Malware-Free Cyberattacks Are On the Rise; Here's How to Detect Them

26-Apr-2023 | Bloomberg Technology

Article icon

CrowdStrike CEO on the Biggest Cyber Threats

26-Apr-2023 | CRN

Article icon

5 Big Statements From Cybersecurity Leaders At RSAC 2023

26-Apr-2023 | SiliconANGLE

Article icon

CrowdStrike partners with Cribl for seamless data transit

26-Apr-2023 | SiliconANGLE's theCUBE

Article icon

Raj Rajamani, CrowdStrike | RSAC 2023

26-Apr-2023 | SiliconANGLE's theCUBE

Article icon

Michael Sentonas, CrowdStrike | RSAC 2023

25-Apr-2023 | SiliconANGLE

Article icon

CrowdStrike launches visibility and threat detection for ChromeOS devices

25-Apr-2023 | CRN

Article icon

20 Hottest Cybersecurity Products At RSAC 2023

25-Apr-2023 | Forbes

Article icon

CrowdStrike Unveils Native Visibility And Threat Detection For ChromeOS

25-Apr-2023 | Security Boulevard

Article icon

CrowdStrike Allies With Google to Secure ChromeOS at the Edge

25-Apr-2023 | SiliconANGLE's theCUBE

Article icon

Abby Strong, Cribl & Daniel Bernard, CrowdStrike | RSAC 2023

24-Apr-2023 | CRN

Article icon

10 Cool New Cybersecurity Tools Announced At RSAC 2023

21-Apr-2023 | CyberScoop

Article icon

CrowdStrike’s James Yeager on frictionless private-public partnerships

21-Apr-2023 | CyberScoop

Article icon

CrowdStrike CTO Elia Zaitsev on opportunities to drive innovation

21-Apr-2023 | CyberScoop

Article icon

CrowdStrike President & CEO on game-changing security strategies leaders need to think about

21-Apr-2023 | CyberScoop

Article icon

CrowdStrike’s Adam Meyers on tactics to prevent attacks

20-Apr-2023 | Security Boulevard

Article icon

CrowdStrike Launches Managed XDR Service

19-Apr-2023 | CRN

Article icon

CrowdStrike Unveils Managed XDR: 5 Big Things To Know

19-Apr-2023 | ChannelBuzz

Article icon

Crowdstrike adds MXDR service with CrowdStrike Falcon Complete XDR

19-Apr-2023 | MSSP Alert

Article icon

CrowdStrike Unveils Managed eXtended Detection and Response (MXDR) Service

19-Apr-2023 | SDxCentral

Article icon

CrowdStrike extends MDR capabilities to offer managed XDR

19-Apr-2023 | SiliconANGLE

Article icon

New CrowdStrike XDR service unifies human expertise with AI-powered automation and threat intelligence

19-Apr-2023 | VentureBeat

Article icon

CrowdStrike turns to managed XDR to help orgs navigate the cyber skills gap

15-Apr-2023 | The CyberWire podcast

Article icon

New Dero cryptojacking operation concentrates on locating Kubernetes.

12-Apr-2023 | Dark Reading

Article icon

CrowdStrike Expands Falcon to Include IoT

11-Apr-2023 | SiliconANGLE

Article icon

CrowdStrike expands platform to deliver endpoint detection to IoT assets

11-Apr-2023 | CSO Online

Article icon

CrowdStrike expands Falcon platform with XDR for IoT assets

11-Apr-2023 | MSSP Alert

Article icon

CrowdStrike Unveils Combined XDR-EDR Solution for Extended IoT Assets

11-Apr-2023 | CNBC Closing Bell: Overtime

Article icon

Crowdstrike CEO on government spending on cyber, vulnerabilities and geopolitical threats

10-Apr-2023 | Security Boulevard

Article icon

CrowdStrike Adds Honeytokens to Deceive Cybercriminals

6-Apr-2023 | The Wall Street Journal

Article icon

CrowdStrike Takes Big Swing at Microsoft

5-Apr-2023 | The Hacker News

Article icon

Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks

5-Apr-2023 | Cybersecurity Dive

Article icon

3CX makes progress restoring Windows app from state-linked supply chain attack

5-Apr-2023 | CRN

Article icon

15 New Cybersecurity Products to Know: Q1 2023

4-Apr-2023 | Forbes

Article icon

CrowdStrike Enhances Falcon Platform With New Identity Protection Capabilities

4-Apr-2023 | Dark Reading

Article icon

How Strategic Investors Can Help Cybersecurity Startups

3-Apr-2023 | Bleeping Computer

Article icon

WinRAR SFX archives can run PowerShell without being detected

30-Mar-2023 | Cybersecurity Dive

Article icon

Supply chain attack against 3CX communications app could impact thousands

30-Mar-2023 | PC Magazine

Article icon

Uninstall Now: Hackers Hijack 3CX Desktop App to Deliver Malware

30-Mar-2023 | SC Media

Article icon

How Deception Technology Fools Everyone with a False Sense of Security

30-Mar-2023 | CRN

Article icon

3CX Supply Chain Attack: 8 Biggest Things To Know

30-Mar-2023 | Dark Reading

Article icon

Automatic Updates Deliver Malicious 3CX 'Upgrades' to Enterprises

30-Mar-2023 | Security Boulevard

Article icon

Should You Choose Agentless or Agent-Based for CNAPP?

29-Mar-2023 | MSSP Alert

Article icon

CrowdStrike Announces Abnormal Security Investment, Partnership

29-Mar-2023 | Bloomberg

Article icon

CrowdStrike Backs Startup That Fights Email Scams

29-Mar-2023 | SiliconANGLE

Article icon

CrowdStrike and Abnormal Security partner for enhanced email and endpoint attack detection

27-Mar-2023 | MSSP Alert

Article icon

ExtraHop and CrowdStrike Team Up for Threat Detection and Response Integration

24-Mar-2023 | GovInfoSecurity

Article icon

Corelight Pursues IR Partnerships, Smaller Enterprise Deals

20-Mar-2023 | TechRepublic

Article icon

First Dero cryptojacking campaign targets unprotected Kubernetes instances

16-Mar-2023 | ChannelPro Network

Article icon

Dell Boosts Security Offerings, Teams with CrowdStrike

16-Mar-2023 | VentureBeat

Article icon

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

15-Mar-2023 | BankInfoSecurity

Article icon

Illicit Crypto Miners Find A New Fav in Privacy Coin Dero

15-Mar-2023 | Bleeping Computer

Article icon

First-known Dero cryptojacking operation seen targeting Kubernetes

15-Mar-2023 | SDxCentral

Article icon

Dell Boosts MDR for Mid-Market, Taps CrowdStrike for Threat Management

15-Mar-2023 | Security Boulevard

Article icon

Dell Adds CrowdStrike to Cybersecurity Services Portfolio

15-Mar-2023 | SecurityWeek

Article icon

Dero, Monero Cryptojackers Fighting for Same Kubernetes Clusters

15-Mar-2023 | SiliconANGLE

Article icon

Hackers target Kubernetes to mine little-known Dero cryptocurrency

14-Mar-2023 | VentureBeat

Article icon

CrowdStrike report shows identities under siege, cloud data theft up

9-Mar-2023 | Yahoo Finance

Article icon

Crowdstrike CEO: Cybersecurity ‘very resilient’ against a recession

8-Mar-2023 | CNBC Mad Money

Article icon

Organizations are understanding security is key to saving money, says CrowdStrike CEO

7-Mar-2023 | Axios

Article icon

Hackers are quickly learning how to breach cloud systems

7-Mar-2023 | TechRepublic

Article icon

CrowdStrike: Attackers focusing on cloud exploits, data theft

7-Mar-2023 | CRN

Article icon

George Kurtz: CrowdStrike Seeing ‘Immense Demand’ From SMBs

7-Mar-2023 | BankInfoSecurity

Article icon

CrowdStrike Goes Downmarket With Dell Pact, Small Biz Bundle

6-Mar-2023 | MSSP Alert

Article icon

CrowdStrike, Dell Partner for Commercial PC Cybersecurity

6-Mar-2023 | Channel Futures

Article icon

CrowdStrike, Dell Team Up to Revamp Commercial PC Cybersecurity

6-Mar-2023 | SiliconANGLE

Article icon

CrowdStrike and Dell strategic alliance assists organizations with cyber threats

3-Mar-2023 | CNBC Special: Taking Stock

Article icon

The attack in Ukraine took a lot of the cyber focus off China, says CrowdStrike’s sr. vp of intelligence

3-Mar-2023 | Forbes

Article icon

CrowdStrike Report Highlights Crucial Shift In Ransomware Tactics

2-Mar-2023 | Small Business Currents

Article icon

How SMBs Can Prepare for Identity-based Attacks in 2023

2-Mar-2023 | The CyberWire

Article icon

The US National Cybersecurity Strategy. Red-teaming critical infrastructure. Cryptojacking. Updates on the hybrid war..

1-Mar-2023 | Financial Times

Article icon

Cyber Security - Increase in cloud attacks is gain for stocks

1-Mar-2023 | NBC News Now

Article icon

China-linked hackers targeted 39 industries on most continents in 2022, report finds

1-Mar-2023 | SC Media

Article icon

Chinese cyberespionage operations increasing in sophistication

1-Mar-2023 | GCN

Article icon

Cyber criminals are increasingly exploiting cloud environments, report finds

28-Feb-2023 | BankinfoSecurity

Article icon

Chinese State Hackers Level Up Their Abilities: CrowdStrike

28-Feb-2023 | CBS Mornings

Article icon

CrowdStrike's chief security officer on global cyber threat landscape

28-Feb-2023 | Channel Futures

Article icon

CrowdStrike Report: New Techniques Favored Over Ransomware in More Attacks

28-Feb-2023 | CRN

Article icon

CrowdStrike: More Cybercriminals Ditching Ransomware To Focus On Data Extortion

28-Feb-2023 | Government Technology

Article icon

Cyber Extortionists’ Newest Ploy: Skipping the Encryption

28-Feb-2023 | MeriTalk

Article icon

CrowdStrike Reports Spike in Cloud Environment Attacks

28-Feb-2023 | MSSP Alert

Article icon

CrowdStrike 2023 Global Threat Report: Cloud Exploitation Up 95% Year Over Year

28-Feb-2023 | NBC News

Article icon

Forget the spy balloon. China-linked hackers collect far more information, report finds

28-Feb-2023 | NextGov

Article icon

Cyber Criminals Are Increasingly Exploiting Cloud Environments, Report Finds

28-Feb-2023 | SDxCentral

Article icon

CrowdStrike Reports Cloud Attacks, Microsoft Vulnerabilities, SIM Swapping Biggest Threats

28-Feb-2023 | Security Boulevard

Article icon

CrowdStrike Report Maps Changes to Cybersecurity Landscape

28-Feb-2023 | TechTarget

Article icon

CrowdStrike: Threat actors shifting away from ransomware

28-Feb-2023 | The CyberWire

Article icon

CrowdStrike's Annual Global Threat Report. Clasiopa targets materials research organizations. PureCrypter deployed against government organizations.

24-Feb-2023 | VentureBeat

Article icon

Experts predict how AI will energize cybersecurity in 2023 and beyond

24-Feb-2023 | Marketplace Tech

Article icon

A year of war, and years of cyberwar, in Ukraine

22-Feb-2023 | SC Magazine

Article icon

Want to stop modern cyberattacks? Use XDR with identity

21-Feb-2023 | CRN

Article icon

The 20 Coolest Endpoint And Managed Security Companies Of 2023: The Security 100

20-Feb-2023 | HealthTech Magazine

Article icon

Zero Trust Offers a Foundation for Authentication and Access in Healthcare

20-Feb-2023 | CRN

Article icon

Here’s What 10 Cybersecurity CEOs Are Prioritizing In 2023

16-Feb-2023 | The New Stack

Article icon

Think Like Adversaries to Safeguard Cloud Environments

15-Feb-2023 | CRN

Article icon

10 Hot XDR Security Companies You Should Watch In 2023

15-Feb-2023 | Sales Game Changers Podcast

Article icon

Tips from CrowdStrike Women in Sales Leaders Amanda Adams and Tracey Mills

12-Feb-2023 | Ad Age

Article icon

See Cybersecurity Firm CrowdStrike's First Super Bowl Ad

12-Feb-2023 | Adweek

Article icon

CrowdStrike Super Bowl Ad Recalls When Trojan Horse Wasn't a Virus

12-Feb-2023 | CNN

Article icon

Super Bowl LVII: Who scored and who fumbled on TV’s biggest stage

10-Feb-2023 | ARN

Article icon

How channel-centric CrowdStrike is executing an ecosystem playbook

10-Feb-2023 | The Register

Article icon

US, UK slap sanctions on Russians linked to Conti, Ryuk, Trickbot malware

10-Feb-2023 | The Hacker News

Article icon

U.K. and U.S. Sanction 7 Russians for TrickBot, Ryuk, and Conti Ransomware Attacks

10-Feb-2023 | SDxCentral

Article icon

LockBit Leaps Conti as Top Ransomware Gang

10-Feb-2023 | Krebs on Security

Article icon

U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group

10-Feb-2023 | VentureBeat

Article icon

CrowdStrike exec explains why the cloud is a ‘net-positive’ for cybersecurity

9-Feb-2023 | Politico

Article icon

U.S., U.K. sanction Russian hackers in ransomware attacks

8-Feb-2023 | CRN

Article icon

CrowdStrike’s Michael Sentonas Promoted From CTO To President

8-Feb-2023 | VentureBeat

Article icon

The cloud’s growing impact on cybersecurity

7-Feb-2023 | EdTech Magazine

Article icon

Tech Alone Isn’t Enough to Secure K–12 Schools

6-Feb-2023 | CRN

Article icon

2023 Channel Chiefs: The 50 Most Influential

3-Feb-2023 | BankInfoSecurity

Article icon

CrowdStrike CEO on Why It's Tough to Defend Sensitive Assets

2-Feb-2023 | CRN

Article icon

10 Cybersecurity Companies Making Moves: January 2023

1-Feb-2023 | Bloomberg

Article icon

FBI’s Hive Sting Generates Buzz, Other Ransomware Gangs Swarm

31-Jan-2023 | Inside Cybersecurity

Article icon

Stakeholders see advances in CISA’s plans for JCDC initiative, lingering questions on resources and benefits

27-Jan-2023 | SC Magazine

Article icon

Three trends public and healthcare cyber defense teams should know about in 2023

26-Jan-2023 | TechStrong TV

Article icon

Cyberattacks Against Microsoft Active Directory – Kapil Raina, CrowdStrike

25-Jan-2023 | American Banker

Article icon

Why this bank CIO is not a fan of password managers

24-Jan-2023 | VentureBeat

Article icon

How password management tools are helping enterprises prevent intrusions

20-Jan-2023 | IT Brew

Article icon

A frequent stop on the ransomware attack path: Active Directory

19-Jan-2023 | Dark Reading

Article icon

Cybercriminals Target Telecom Provider Networks

19-Jan-2023 | Investor's Business Daily

Article icon

CrowdStrike Initiated At Outperform Amid Microsoft Cybersecurity Battle

18-Jan-2023 | MSNBC

Article icon

Shawn Henry breaks down security risks of Chinese-owned TikTok

18-Jan-2023 | SC Magazine

Article icon

Former SentinelOne execs join CrowdStrike

17-Jan-2023 | Channel Futures

Article icon

CrowdStrike Hires SentinelOne Vets to Drive Continued Growth

17-Jan-2023 | CRN

Article icon

CrowdStrike Poaches Two Execs From Rival SentinelOne

17-Jan-2023 | Investor's Business Daily

Article icon

CrowdStrike CEO: Cybersecurity is 'Equivalent to Shelter' As U.S. Recession Looms

17-Jan-2023 | IT Visionaries

Article icon

Ensuring Data Security Through Collaboration

17-Jan-2023 | SDxCentral

Article icon

CrowdStrike Snares Former SentinelOne CMO, CPO

13-Jan-2023 | CNET

Article icon

Tech Companies Need to Be Held Accountable for Security, Experts Say

12-Jan-2023 | TechTarget

Article icon

Vulnerable software, low incident reporting raises risks

12-Jan-2023 | ZDNet

Article icon

Hackers are using this old trick to dodge security protections

12-Jan-2023 | The New Stack

Article icon

5 Best Practices for DevSecOps Teams to Ensure Compliance

11-Jan-2023 | Bleeping Computer

Article icon

Scattered Spider hackers use old Intel driver to bypass security

11-Jan-2023 | IT World Canada

Article icon

Threat actor trying to exploit old Windows weakness

11-Jan-2023 | SecurityWeek

Article icon

Cybercrime Group Exploiting Old Windows Driver Vulnerability to Bypass Security Products

11-Jan-2023 | CSO Online

Article icon

Cybercriminals bypass Windows security with driver-vulnerability exploit

10-Jan-2023 | CRN

Article icon

Glassdoor: The Top 10 Tech Companies To Work For In 2023

9-Jan-2023 | Newsday

Article icon

Reported Russian cyberattack on BNL, other labs appears unsuccessful, feds say

9-Jan-2023 | Cybersecurity Dive

Article icon

Tech priorities out of sync with security needs, CISA director says

6-Jan-2023 | Reuters

Article icon

Exclusive: Russian hackers targeted U.S. nuclear scientists

6-Jan-2023 | Yahoo Finance

Article icon

Crowdstrike CEO on cybersecurity: Devices should be ‘secure out of the box’

5-Jan-2023 | CNBC TechCheck

Article icon

CrowdStrike CEO George Kurtz on cybersecurity in 2023

5-Jan-2023 | Bloomberg Technology

Article icon

CrowdStrike CEO on Cybercrime Uptick

5-Jan-2023 | Bloomberg Technology Podcast

Article icon

Live from the Desert, It's the CES

4-Jan-2023 | VentureBeat

Article icon

How hybrid cybersecurity is strengthened by AI, machine learning and human intelligence

3-Jan-2023 | VentureBeat

Article icon

Defensive vs. offensive AI: Why security teams are losing the AI war

30-Dec-2022 | VentureBeat

Article icon

How leading endpoint security providers compare on enterprise performance

27-Dec-2022 | Channel Futures

Article icon

Channel Futures 2023 Cybersecurity Outlook: Newer Targets, Tighter Budgets, More Sharing

23-Dec-2022 | The CyberWire

Article icon

PolyVice and Royal ransomware make nuisances of themselves. US warns that KillNet can be expected to go after the healthcare sector. CISA’s plans for stakeholder engagement.

23-Dec-2022 | IT World Canada

Article icon

Cyber Security Today, Dec. 23, 2022 – A new attack vector against Exchange and more unprotected data found on AWS S3 buckets

22-Dec-2022 | Cybersecurity Dive

Article icon

New exploit for Microsoft’s ProxyNotShell mitigation side steps fix

21-Dec-2022 | The Hacker News

Article icon

Ransomware Hackers Using New Way to Bypass MS Exchange ProxyNotShell Mitigations

21-Dec-2022 | TechRadar

Article icon

A new Microsoft Exchange flaw is being used to attack servers

21-Dec-2022 | Dark Reading

Article icon

Ransomware Attackers Bypass Microsoft's ProxyNotShell Mitigations With Fresh Exploit

21-Dec-2022 | Decipher

Article icon

Play Ransomware Group Using New ProxyNotShell Exploit

21-Dec-2022 | TechTarget

Article icon

Play ransomware actors bypass ProxyNotShell mitigations

21-Dec-2022 | SecurityWeek

Article icon

Ransomware Uses New Exploit to Bypass ProxyNotShell Mitigations

21-Dec-2022 | SC Magazine

Article icon

Ransomware groups use new exploit to bypass ProxyNotShell mitigations for Microsoft Exchange

20-Dec-2022 | Help Net Security

Article icon

New Microsoft Exchange exploit chain lets ransomware attackers in (CVE-2022-41080)

20-Dec-2022 | Bleeping Computer

Article icon

Ransomware gang uses new Microsoft Exchange exploit to breach servers

19-Dec-2022 | SDxCentral

Article icon

CrowdStrike Flies Falcon Surface at Crowded EASM Market

15-Dec-2022 | SiliconANGLE

Article icon

CrowdStrike expands its Falcon platform with adversary-driven EASM technology

15-Dec-2022 | MSSP Alert

Article icon

CrowdStrike Adds External Attack Surface Management to Security Platform

15-Dec-2022 | Security Boulevard

Article icon

CrowdStrike Adds Attack Surface Management Module

14-Dec-2022 | CRN

Article icon

Rackspace: FBI, CrowdStrike Make Progress In Attack Probe

13-Dec-2022 | ZDNet (Singapore)

Article icon

Singapore Wants All Critical Infrastructures to be Ready for Cyber Threats

11-Dec-2022 | Politico

Article icon

Shadowboxing and geopolitics on the dark web

8-Dec-2022 | CRN

Article icon

The 10 Hottest Cloud Security Tools And Products Of 2022

7-Dec-2022 | DevOps.com

Article icon

What the Convergence of Observability and Security Means for Devs

7-Dec-2022 | IT World Canada

Article icon

Cyber Security Today, Dec. 7, 2022 – Rackspace hit by ransomware, employees are still falling for the fake IT colleague scam, and more

7-Dec-2022 | CTV News

Article icon

RCMP suspends contract with China-linked company

7-Dec-2022 | SC Magazine

Article icon

Novel intrusion campaign against telecom, BPO firms detailed

6-Dec-2022 | The Hacker News

Article icon

Telcom and BPO Companies Under Attack by SIM Swapping Hackers

6-Dec-2022 | SecurityWeek

Article icon

Scattered Spider Cybercrime Group Targets Mobile Carriers via Telecom, BPO Firms

5-Dec-2022 | Inside Cybersecurity

Article icon

CrowdStrike urges CISA to develop guidance for determining ‘reasonable belief’ in incident reporting regulation

5-Dec-2022 | Yahoo Finance

Article icon

Cybersecurity spending ‘difficult to cut’ despite recession risks: CrowdStrike CEO

5-Dec-2022 | Bleeping Computer

Article icon

Sneaky hackers reverse defense mitigations when detected

2-Dec-2022 | Dark Reading

Article icon

Where Advanced Cyberttackers Are Heading Next: Disruptive Hits, New Tech

1-Dec-2022 | CNBC Mad Money

Article icon

Watch Jim Cramer’s full interview with CrowdStrike CEO George Kurtz

30-Nov-2022 | VentureBeat

Article icon

How CISOs get multicloud security right with CIEM

30-Nov-2022 | VentureBeat

Article icon

How CISOs get multicloud security right with CIEM

28-Nov-2022 | HealthTech Magazine

Article icon

Top 3 Priorities for Strengthening Supply Chain Security in Healthcare

28-Nov-2022 | VentureBeat

Article icon

Where CISOs rely on AI and machine learning to strengthen cybersecurity

23-Nov-2022 | VentureBeat

Article icon

Where CISOs are getting quick zero-trust wins today to save tomorrow’s budgets

22-Nov-2022 | Down the Security Rabbithole Podcast

Article icon

Fun with Machines Learning

22-Nov-2022 | Dark Reading

Article icon

How Tech Companies Can Slow Down Spike in Breaches

22-Nov-2022 | ARN (Australia)

Article icon

CrowdStrike looks beyond ‘tick-box exercise’ of channel certification

21-Nov-2022 | Washington Exec

Article icon

Pinnacle Award Finalist Shawn Henry: ‘One Team, One Fight’

21-Nov-2022 | VentureBeat

Article icon

MITRE’s MDR stress-test winners combine human intelligence and AI for stronger cybersecurity

15-Nov-2022 | VentureBeat

Article icon

5 reasons zero trust is the future of endpoint security

15-Nov-2022 | VentureBeat

Article icon

How zero trust closes security gaps in multicloud tech stacks

14-Nov-2022 | CRN

Article icon

The 2022 Tech Innovator Awards

13-Nov-2022 | HealthcareITNews

Article icon

Speed Is the new currency of cybersecurity

11-Nov-2022 | MSSP Alert

Article icon

Kroll Expands Managed Security Services Ecosystem with CrowdStrike Partnership

8-Nov-2022 | CQ Roll Call

Article icon

‘Rampant disinformation’ seen undermining safe voting technology

3-Nov-2022 | HealthTech Magazine

Article icon

Review: CrowdStrike Falcon Can Protect Any Cloud at Any Time

2-Nov-2022 | SC Magazine

Article icon

The new pillars of modern security: workloads, identities, and data

1-Nov-2022 | EdTech Magazine

Article icon

EDUCAUSE 2022: Security Experts Discuss Innovation and Partnerships

26-Oct-2022 | SC Media

Article icon

Researchers uncover cryptojacking campaign targeting Docker, Kubernetes cloud servers

26-Oct-2022 | Container Journal

Article icon

CrowdStrike Details Sophisticated Container Cryptojacking Campaign

26-Oct-2022 | HealthTech Magazine

Article icon

How MDR Services Are Helping Healthcare Organizations ‘Sleep Peacefully at Night’

26-Oct-2022 | Dark Reading

Article icon

Cryptojacking, Freejacking Compromise Cloud Infrastructure

25-Oct-2022 | SC Media

Article icon

CrowdStrike, Ernst & Young to offer cloud security and observability services

25-Oct-2022 | GCN

Article icon

How one state bolsters its employees’ cyber hygiene

21-Oct-2022 | FanNation

Article icon

F1 News: Watch Lewis Hamilton Give A Driving Masterclass At Austin GP Circuit

21-Oct-2022 | CNET

Article icon

Ukraine Could Still Face Cyberattacks, Experts Say

21-Oct-2022 | CNBC TechCheck

Article icon

Tech Meets the Track: George Kurtz & Toto Wolff on F1

20-Oct-2022 | Grand Tour Nation

Article icon

F1 News: Lewis Hamilton Gives A Driving Masterclass Ahead Of US Grand Prix Weekend

17-Oct-2022 | Protocol

Article icon

Why security teams are losing trust in the term ‘zero trust’

17-Oct-2022 | Protocol Enterprise (newsletter)

Article icon

Vendor trust factor: Less than zero

16-Oct-2022 | The CyberWire

Article icon

Amanda Adams: Pivoting into the tech world. [VP]

14-Oct-2022 | VentureBeat

Article icon

Which cybersecurity metrics matter most to CISOs today?

13-Oct-2022 | The Washington Post

Article icon

Transcript: Securing Cyberspace

12-Oct-2022 | TechCrunch

Article icon

Vanta lands $40M to automate cybersecurity compliance

12-Oct-2022 | S&P Global Market Intelligence

Article icon

Incomplete data breach records up as US debates cybersecurity authority

12-Oct-2022 | CRN

Article icon

CrowdStrike CEO George Kurtz: Microsoft’s Security Offerings Are A ‘Leaky Lifeboat’

12-Oct-2022 | HealthTech Magazine

Article icon

What Is MDR, and How Does It Benefit Healthcare Organizations?

11-Oct-2022 | Down the Security Rabbithole Podcast

Article icon

DtSR Episode 521 - The Peanut Gallery Takes on XDR

11-Oct-2022 | CPO Magazine

Article icon

Executive Order for EU-US Data Transfers Looks To Smooth Over GDPR Restrictions, but Privacy Advocates Are Unsatisfied

10-Oct-2022 | VentureBeat

Article icon

Why data loss prevention (DLP) matters in a zero-trust world

9-Oct-2022 | Protocol

Article icon

CrowdStrike CEO George Kurtz has Microsoft squarely in his sights

8-Oct-2022 | CRN

Article icon

30 Notable IT Executive Moves: September 2022

7-Oct-2022 | Protocol

Article icon

With security revenue surging, CrowdStrike wants to be a broader enterprise IT player

7-Oct-2022 | Inside Cybersecurity

Article icon

Biden executive order takes steps to implement U.S.-EU ‘data privacy framework’

7-Oct-2022 | Protocol Enterprise

Article icon

CrowdStrike’s George Kurtz has a plan

7-Oct-2022 | Protocol Source Code (newsletter)

Article icon

Is Meta’s new VR headset ready for business?

6-Oct-2022 | CRN

Article icon

12 Cool Cybersecurity Products And Services In 2022

6-Oct-2022 | Cybersecurity Dive

Article icon

Why user experience is essential to identity protection

4-Oct-2022 | CRN

Article icon

10 Hot Cyber Threat Intelligence Tools And Services In 2022

4-Oct-2022 | StateTech Magazine

Article icon

Augmented Government Network Security Supports Mass Remote Work

3-Oct-2022 | Protocol

Article icon

5 ways businesses can improve information security

3-Oct-2022 | Protocol

Article icon

Identity-based cyberattacks are the leading cause of security breaches. Here’s how to stop them.

3-Oct-2022 | Bleeping Computer

Article icon

Live support service hacked to spread malware in supply chain attack

3-Oct-2022 | SecurityWeek

Article icon

Supply Chain Attack Targets Customer Engagement Firm Comm100

3-Oct-2022 | Ad Age

Article icon

Watch the Newest Commercials from Xfinity Mobile, Dodge, Dr. Squatch and More

2-Oct-2022 | WGRZ

Article icon

City of Buffalo announces partnership with cyber company to help with ransomware attacks

2-Oct-2022 | The Buffalo News

Article icon

New cyber security platform will be free for City of Buffalo

30-Sep-2022 | CNBC Street Signs Asia

Article icon

Traditional approaches to cybersecurity don’t work, says CrowdStrike

30-Sep-2022 | Reuters

Article icon

Exclusive: Suspected Chinese hackers tampered with widely used Canadian chat program -researchers

30-Sep-2022 | Decipher

Article icon

Threat Actor Delivered Malware Via Trojanized Live Chat Installer

29-Sep-2022 | SiliconANGLE theCUBE

Article icon

Three insights you might have missed from theCUBE @ Fal.Con 2022

28-Sep-2022 | Down the Security Rabbithole Podcast

Article icon

DtSR Episode 519 - Insights From an Industry Leader

26-Sep-2022 | VentureBeat

Article icon

CrowdStrike’s platform plan at Fal.Con melds security and observability

26-Sep-2022 | VentureBeat

Article icon

How CrowdStrike consolidates tech stacks as a growth strategy

26-Sep-2022 | CNBC TechCheck

Article icon

CrowdStrike's modular format appeals to customers facing economic downturn

23-Sep-2022 | SiliconANGLE theCUBE

Article icon

CrowdStrike stirs the evolution of heightened cloud security with help from partners

23-Sep-2022 | Security Magazine

Article icon

The value of an adversary-focused approach to cybersecurity

23-Sep-2022 | CRN

Article icon

5 Companies That Came To Win This Week

23-Sep-2022 | SiliconANGLE theCUBE

Article icon

Counting the cybersecurity dividends of the AWS-CrowdStrike partnership

22-Sep-2022 | MSSP Alert

Article icon

Zscaler, CrowdStrike Expand Zero Trust Security Partnership

22-Sep-2022 | Channel Futures

Article icon

CrowdStrike Acquiring Reposify

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Observability and expanded ecosystem capture analysts’ attention at CrowdStrike’s Fal.Con

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Day 2 Wrap Up | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Amol Kulkarni, CrowdStrike | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Shawn Henry, CrowdStrike | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Michael Sentonas, CrowdStrike | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Rob Picard, Vanta | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Michael Nicosia, Salt Security | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Sven Krasser, CrowdStrike | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Stephan Goldberg, Claroty | CrowdStrike Fal.Con 2022

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Todd Crosley, CrowdStrike & Patrick McDowell, AWS | CrowdStrike Fal.Con 2022

21-Sep-2022 | MSSP Alert

Article icon

CrowdStrike Acquires External Attack Surface Management Company Reposify

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Analyst assesses CrowdStrike’s opportunity to consolidate tools and enrich security beyond the endpoint

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Q&A: CrowdStrike launches service program, elite partnership with Cyber Defense Labs

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

Lightweight agents help CrowdStrike process 7 trillion events per week for customer security

21-Sep-2022 | SiliconANGLE theCUBE

Article icon

CrowdStrike CSO weighs in on cybersecurity initiatives helping private and public sectors

21-Sep-2022 | Inside Cybersecurity

Article icon

Deputy cyber director Walden says ‘backend’ incident reporting issues are being worked out among agencies

21-Sep-2022 | FedScoop

Article icon

ONCD senior leader says FBI and operational cyber agencies have improved incident info sharing

20-Sep-2022 | SiliconANGLE theCube

Article icon

George Kurtz, CrowdStrike | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Amanda Adams, CrowdStrike | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Adam Meyers, CrowdStrike | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Michael Sherwood, City of Las Vegas | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

JC Herrera, CrowdStrike, Craig Neri & Diezel Lodder, Operation Motorsport | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Kevin Mandia, Mandiant & Shawn Henry, CrowdStrike | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Michael Rogers, CrowdStrike | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Geoff Swaine, CrowdStrike | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Anthony Cunha, Mercury Financial & Alex Arango, Mercury Financial | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Jason Cook, Cyber Defense Labs & Mike Riolo, CrowdStrike | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE theCUBE

Article icon

Day 1 Keynote Analysis | CrowdStrike Fal.Con 2022

20-Sep-2022 | SiliconANGLE

Article icon

CrowdStrike extends XDR to Falcon Insight, adds new third-party telemetry

20-Sep-2022 | Security Week

Article icon

CrowdStrike to Buy Reposify, Invests in Salt Security

20-Sep-2022 | SDxCentral

Article icon

CrowdStrike Ramps ‘Hybrid XDR;’ Cisco, Fortinet Join Alliance

20-Sep-2022 | SDxCentral

Article icon

CrowdStrike Grabs Reposify for EASM Visibility

20-Sep-2022 | CSO Online

Article icon

CrowdStrike adds XDR, other capabilities across 4 key security products

20-Sep-2022 | CRN

Article icon

CrowdStrike Moves To Buy Reposify To Beef Up Threat Intelligence

20-Sep-2022 | ChannelBuzz

Article icon

CrowdStrike makes major product announcements at Fal.con event

19-Sep-2022 | SiliconANGLE

Article icon

New CrowdStrike Powered Service Provider program unlocks value-added solution bundles

19-Sep-2022 | MSSP Alert

Article icon

CrowdStrike Launches Partner Program for MSSPs, MDR Providers

19-Sep-2022 | CRN

Article icon

CrowdStrike Launches New Partner Program That Includes ‘Elite’ Category

19-Sep-2022 | Channel Futures

Article icon

CrowdStrike Unveils New Partner Program, New Elite Partner Tier

19-Sep-2022 | ChannelBuzz

Article icon

CrowdStrike launches separate partner program for service providers

17-Sep-2022 | SiliconANGLE

Article icon

How CrowdStrike plans to become a generational platform

16-Sep-2022 | Help Net Security

Article icon

CrowdStrike appoints Jennifer Johnson as CMO

14-Sep-2022 | Dark Reading

Article icon

Cyberattacks Are Now Increasingly Hands-On, Break Out More Quickly

13-Sep-2022 | TechTarget

Article icon

CrowdStrike threat report: Intrusions up, breakout time down

13-Sep-2022 | CBS News

Article icon

Report warns hackers are stepping up attacks on public and private computer systems

9-Sep-2022 | SiliconANGLE

Article icon

What to expect during Fal.Con: Join theCUBE Sept. 20-21

6-Sep-2022 | VentureBeat

Article icon

Healthcare ransomware attacks are increasing – how to prepare

1-Sep-2022 | The Julia La Roche Show

Article icon

CrowdStrike's Adam Meyers On The Biggest Cyber Threats

1-Sep-2022 | News 12 Long Island

Article icon

Long Island schools boost cyber security efforts

1-Sep-2022 | Bloomberg Technology

Article icon

CrowdStrike CEO on Cyber Threat Landscape

31-Aug-2022 | CNBC Mad Money

Article icon

Watch Jim Cramer’s full interview with CrowdStrike CEO George Kurtz

22-Aug-2022 | VentureBeat

Article icon

How cybersecurity vendors are misrepresenting zero trust

22-Aug-2022 | SC Magazine

Article icon

Lessons from Ukraine: How cyberwar shapes security at home

22-Aug-2022 | SC Magazine

Article icon

Best Security Company | CrowdStrike

17-Aug-2022 | The Washington Post

Article icon

Is the drop in ransomware numbers an illusion?

17-Aug-2022 | Built in ATX

Article icon

The Best of Both Worlds: These Austinite Companies Are Harnessing the Power of Hybrid Work

17-Aug-2022 | BankInfoSecurity

Article icon

CrowdStrike's Michael Sentonas on Identity, Cloud and XDR

12-Aug-2022 | CRN

Article icon

The 10 Hottest Cybersecurity Products at Black Hat 2022

11-Aug-2022 | The Washington Post

Article icon

Why hackers are able to steal billions of dollars worth of cryptocurrency

11-Aug-2022 | SC Media

Article icon

Why it’s impossible to have autonomous security without humans

10-Aug-2022 | SiliconANGLE

Article icon

CrowdStrike’s new AI-powered ‘Indicators of Attack’ offer enhanced visibility of cloud intrusions

10-Aug-2022 | SDxCentral

Article icon

CrowdStrike Adds AI to Indicators of Attack Detection

10-Aug-2022 | CSO Online

Article icon

CrowdStrike adds AI-powered indicators of attack to Falcon platform

10-Aug-2022 | Forbes

Article icon

Coalition Of Cybersecurity Leaders Launch Open Cybersecurity Schema Framework (OCSF)

10-Aug-2022 | The Wall Street Journal

Article icon

Tech, Cyber Companies Launch Security Standard to Monitor Hacking Attempts

10-Aug-2022 | CNN

Article icon

More than a dozen companies developing single standard to detect cyberattacks faster

4-Aug-2022 | CRN

Article icon

Crowdstrike Helps Fuel Talon Cyber Security’S $100M Round To Push More Secure Browser

3-Aug-2022 | Protocol

Article icon

Russian hackers get the headlines. But China is the bigger threat to many US enterprises.

2-Aug-2022 | TechTarget

Article icon

July another down month in ransomware attack disclosures

1-Aug-2022 | CRN

Article icon

The 25 Most Influential Executives of 2022

28-Jul-2022 | SiliconANGLE The Cube

Article icon

Geoff Swaine, CrowdStrike | AWS re:Inforce 2022

27-Jul-2022 | MSSP Alert

Article icon

CrowdStrike Unveils Cloud Threat Hunting Service

27-Jul-2022 | SDxCentral

Article icon

CrowdStrike: Threat Hunting Should Be Human-Based

26-Jul-2022 | CSO Online

Article icon

CrowdStrike enhances container visibility and threat hunting capabilities

26-Jul-2022 | TechTarget

Article icon

CrowdStrike launches cloud threat hunting service

26-Jul-2022 | Security Boulevard

Article icon

CrowdStrike Expands Reach and Scope of CNAPP Capabilities

26-Jul-2022 | SiliconANGLE

Article icon

CrowdStrike announces new threat hunting product, expands container security

26-Jul-2022 | VentureBeat

Article icon

CrowdStrike introduces a new cloud threat hunting service

20-Jul-2022 | ExecutiveBiz

Article icon

Executive Spotlight: James Yeager, VP of Public Sector and Healthcare at CrowdStrike

19-Jul-2022 | Built In San Francisco

Article icon

Cultural Tetris: How CrowdStrike Organizes a Thriving Remote Culture

19-Jul-2022 | CRN

Article icon

10 Coolest Cloud Security Tools and Products 2022 (So Far)

18-Jul-2022 | Fortune

Article icon

100 Best Large Workplaces for Millennials

15-Jul-2022 | CSO Online

Article icon

Let’s Talk About Cloud Threat Hunting

13-Jul-2022 | Security Magazine

Article icon

Solving the identity crisis in cybersecurity

12-Jul-2022 | ChannelPartnerInsight

Article icon

ExtraHop expands partnership with CrowdStrike

11-Jul-2022 | Inside Cybersecurity

Article icon

CrowdStrike issues cloud security report, highlights threats from Russian adversaries

11-Jul-2022 | CRN

Article icon

The 2022 Rising Female Stars of the IT Channel

8-Jul-2022 | The Jerusalem Post

Article icon

Haifa's new port - a Chinese automatic machine for shipping

7-Jul-2022 | Cory Johnson’s The Drill Down Podcast

Article icon

Ep. 161: CrowdStrike CEO George Kurtz

6-Jul-2022 | CNBC Street Signs Asia

Article icon

Cybersecurity firm discusses one of the ‘changing pieces’ it has seen in the last several month

6-Jul-2022 | Fortt Knox Podcast

Article icon

George Kurtz, CrowdStrike CEO: A Fortt Knox Conversation

5-Jul-2022 | Yahoo Finance Live

Article icon

CrowdStrike CEO details evolving cyber threats for remote workers

5-Jul-2022 | CRN UK

Article icon

Interview with Claudia Hebden - CRN Vendor Power list

5-Jul-2022 | CyberScoop

Article icon

The Ukraine war could provide a cyberwarfare manual for Chinese generals eyeing Taiwan

5-Jul-2022 | ZDNet

Article icon

These are the biggest cybersecurity threats. Make sure you aren't ignoring them

1-Jul-2022 | FCW

Article icon

Vendors prep for new cyber rules of the road

30-Jun-2022 | TechStrong TV

Article icon

Amol Kulkarni, CrowdStrike | RSA Conference 2022

28-Jun-2022 | Threatpost

Article icon

Mitel VoIP Bug Exploited in Ransomware Attacks

27-Jun-2022 | IT World Canada

Article icon

Cyber Security Today, June 27, 2022 – A warning to firms using VoIP systems, malicious files in an open source Python registry, and more

24-Jun-2022 | SecurityWeek

Article icon

CrowdStrike: Ransomware Actor Caught Exploiting Mitel VOIP Zero-Day

24-Jun-2022 | CRN

Article icon

25 Mobile Security Products Locking Down Our Data: The 2022 CRN Mobile 100

24-Jun-2022 | Bleeping Computer

Article icon

Mitel zero-day used by hackers in suspected ransomware attack

22-Jun-2022 | Inside Cybersecurity

Article icon

House approves Rep. Swalwell’s industrial control system cyber training measure

22-Jun-2022 | FedScoop

Article icon

FedScoop announces the Best Bosses in Federal IT 2022

22-Jun-2022 | Federal News Network

Article icon

Zero Trust Cyber Exchange: CrowdStrike’s James Yeager does a little cyber myth-busting

20-Jun-2022 | TechTarget

Article icon

AWS partner ecosystem finds bigger deals in Marketplace

20-Jun-2022 | Channel Futures

Article icon

Forrester: Buying Through AWS Marketplace Creates Important Outcomes

16-Jun-2022 | The New Stack

Article icon

5 Security Tasks DevOps Teams Should Consider When Shifting Left

16-Jun-2022 | BankInfoSecurity

Article icon

Why Implementing Security Technology Is Such a Challenge

13-Jun-2022 | SDxCentral

Article icon

CrowdStrike Sees Opportunities to ‘Replace Carbon Black’ Post Broadcom-VMware Acquisition

9-Jun-2022 | Bloomberg Technology

Article icon

CrowdStrike on the Future of Cyber Security Landscape

9-Jun-2022 | TechTarget

Article icon

CrowdStrike demonstrates dangers of container escape attacks

8-Jun-2022 | CRN

Article icon

20 Hottest Cybersecurity Products At RSAC 2022

8-Jun-2022 | The Hill

Article icon

Beijing-backed hackers breach ‘major telecommunications companies,’ authorities warn

8-Jun-2022 | The CyberWire

Article icon

Cyber war: a continuing threat, a blurry line between combatants and noncombatants

7-Jun-2022 | Security Boulevard

Article icon

CrowdStrike Adds Automated Asset Discovery to Cloud Platform

6-Jun-2022 | CNBC

Article icon

CrowdStrike CEO discusses ransomware 'lock-and-leak' operations

6-Jun-2022 | SiliconANGLE

Article icon

CrowdStrike announces new products, adds new CrowdXDR Alliance members

5-Jun-2022 | MedCity News

Article icon

How identity segmentation can reduce the attack surface for healthcare organizations

4-Jun-2022 | The CyberWire

Article icon

LemonDucks evading detection

1-Jun-2022 | Inside Cybersecurity

Article icon

CrowdStrike leader: More focus needed on security side of data privacy requirements

31-May-2022 | Wired

Article icon

Good Luck Not Accidentally Hiring a North Korean Scammer

31-May-2022 | Cybersecurity Dive

Article icon

Conti ransomware gang grows brash and flames out. What's next?

26-May-2022 | DevOps.com

Article icon

Why DevSecOps Should Be Top Priority

25-May-2022 | Bleeping Computer

Article icon

BPFDoor malware uses Solaris vulnerability to get root privileges

19-May-2022 | FCW

Article icon

5 ways to proactively protect government networks

19-May-2022 | Health Data Management

Article icon

7 key steps for protecting against cyberattacks

19-May-2022 | TechCrunch

Article icon

Dig emerges from stealth to help organizations secure their data in public clouds

18-May-2022 | Wall Street Journal

Article icon

U.S. Saw Signs of Decline in Russian Ransomware Strikes at Start of Ukraine War

16-May-2022 | HealthInfoSecurity

Article icon

AvosLocker Claims Data Theft From Another Healthcare Entity

13-May-2022 | BankInfoSecurity

Article icon

Post-Exploitation Framework Targets Microsoft Servers

13-May-2022 | CSO Online

Article icon

The Top 4 Threats to a Secure Cloud Infrastructure

11-May-2022 | Dark Reading

Article icon

Cyber-Espionage Attack Drops Post-Exploit Malware Framework on Microsoft Exchange Servers

11-May-2022 | CSO Online

Article icon

Threat hunters expose novel IceApple attack framework

11-May-2022 | Bleeping Computer

Article icon

New IceApple exploit toolset deployed on Microsoft Exchange servers

10-May-2022 | SDxCentral

Article icon

CrowdStrike: Defenders Must Think Like Attackers in Cloud

10-May-2022 | Financial Times

Article icon

Ukraine war reveals ‘black swan’ danger

9-May-2022 | CRN

Article icon

The Most Powerful Women Of The Channel 2022: Power 100

6-May-2022 | BankInfoSecurity

Article icon

Pro-Ukraine Groups Exploit Containers to Launch DoS Attacks

5-May-2022 | Channel Futures

Article icon

CrowdStrike Channel Partners Crucial to Reaching Revenue Goals

5-May-2022 | The New Stack

Article icon

Crowdstrike Ups Its Falcon Cloud Security Game

4-May-2022 | Dark Reading

Article icon

Docker Under Siege: Cybercriminals Compromise Honeypots to Ramp Up Attacks

4-May-2022 | Container Journal

Article icon

CrowdStrike: DoS Attack Against Russia Uses Containers

4-May-2022 | Bleeping Computer

Article icon

Pro-Ukraine hackers use Docker images to DDoS Russian sites

3-May-2022 | SC Media

Article icon

CrowdStrike unveils upgrades to CNAPP

2-May-2022 | SC Magazine

Article icon

US critical infrastructure companies stay on high alert for Russian cyberattacks as the war in Ukraine continues

1-May-2022 | StateScoop

Article icon

Announcing the 2022 StateScoop 50 Awards winners

27-Apr-2022 | VentureBeat

Article icon

CrowdStrike unveils tools to fight threats to cloud-native applications

27-Apr-2022 | SiliconANGLE

Article icon

CrowdStrike introduces new cybersecurity features for cloud environments

27-Apr-2022 | Container Journal

Article icon

CrowdStrike Adds Container Support to Cloud Security Platform

27-Apr-2022 | eWEEK

Article icon

CrowdStrike’s Amol Kulkarni on Trends in Cybersecurity

26-Apr-2022 | Container Journal

Article icon

CrowdStrike Details LemonDuck Cryptojacking Container Attack Campaign

25-Apr-2022 | TechTarget

Article icon

LemonDuck botnet evades detection in cryptomining attacks

22-Apr-2022 | CSO Online

Article icon

Cryptomining botnet targeting Docker on Linux systems

22-Apr-2022 | SC Magazine

Article icon

LemonDuck bot targets Docker cloud instances to mine cryptocurrency on Linux systems

22-Apr-2022 | ZDNet

Article icon

LemonDuck botnet plunders Docker cloud instances in cryptocurrency crime wave

21-Apr-2022 | Bleeping Computer

Article icon

Docker servers hacked in ongoing cryptomining malware campaign

21-Apr-2022 | Decipher

Article icon

Lemon Duck Botnet Targets Exposed Docker APIs

20-Apr-2022 | MeriTalk

Article icon

CISA Adds ICS/OT Muscle to Joint Cyber Defense Collaborative

20-Apr-2022 | The Hill

Article icon

CISA expands its cyber defense division to include control systems expertise

19-Apr-2022 | VentureBeat

Article icon

CrowdStrike's chief product officer on identity security, zero trust and XDR

16-Apr-2022 | VentureBeat

Article icon

Microsoft releases patch for RCP vulnerability (why you need to act quickly)

15-Apr-2022 | KTVU Fox 2 San Francisco

Article icon

Corporate executives receive cyberwarfare warning from federal agencies

14-Apr-2022 | MSSP Alert

Article icon

CrowdStrike Venture Fund Embraces MSP, MSSP Focused Security Startups

11-Apr-2022 | Australian Financial Review

Article icon

‘The big one is coming’: tech giant’s stark Russia warning

8-Apr-2022 | CNBC Tech Check

Article icon

‘It’s kind of wait and see,’ for M&A in cybersecurity, says CrowdStrike CEO

8-Apr-2022 | SDxCentral

Article icon

CrowdStrike, Mandiant Push ‘Collaborative Approach’ in Cybersecurity

8-Apr-2022 | ExecutiveGov

Article icon

DISA Authorizes CrowdStrike Platform for Controlled Unclassified Defense Info Protection

7-Apr-2022 | Cyberscoop

Article icon

CrowdStrike, Mandiant announce 'strategic partnership'

7-Apr-2022 | The Washington Post

Article icon

Leading security companies Mandiant and CrowdStrike vow to collaborate

7-Apr-2022 | SC Magazine

Article icon

Will more collaboration between Mandiant and CrowdStrike make us safer?

7-Apr-2022 | CSO Online

Article icon

CrowdStrike and Mandiant form strategic partnership to protect organizations against cyber threats

7-Apr-2022 | Dark Reading

Article icon

Mandiant to Use CrowdStrike Technology in Its Incident Response Services

6-Apr-2022 | CSO Online

Article icon

New threat group underscores mounting concerns over Russian cyber threats

6-Apr-2022 | CBS News

Article icon

Cybersecurity expert discusses how U.S. is defending against Russian cyberattacks

6-Apr-2022 | The New York Times

Article icon

U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks

5-Apr-2022 | Federal News Network

Article icon

Top four zero trust misconceptions

5-Apr-2022 | Inside Cybersecurity

Article icon

At House Homeland hearing, industry leaders run through challenges and collaborations in Ukraine war environment

5-Apr-2022 | Inside Cybersecurity

Article icon

At House Homeland hearing, industry leaders run through challenges and collaborations in Ukraine war environment

5-Apr-2022 | Federal News Network

Article icon

Top four zero trust misconceptions

1-Apr-2022 | TechTarget

Article icon

CrowdStrike finds 'logging inaccuracies' in Microsoft 365

1-Apr-2022 | TechTarget

Article icon

CrowdStrike finds 'logging inaccuracies' in Microsoft 365

31-Mar-2022 | Protocol

Article icon

Beyond avoiding cyberattacks, what signals will tell you your cybersecurity strategy is actually effective?

31-Mar-2022 | Inside Cybersecurity

Article icon

Ukraine Update: NIST posts Ukrainian translation of cyber framework, security firm offers details on cyber attacker

31-Mar-2022 | Inside Cybersecurity

Article icon

Ukraine Update: NIST posts Ukrainian translation of cyber framework, security firm offers details on cyber attacker

30-Mar-2022 | The Washington Post

Article icon

Ukraine suffered two cyberattacks in the lead-up to Russia's invasion

24-Mar-2022 | GovLoop

Article icon

4 Cybersecurity Trends Agencies Should Stay on Top of in 2022

21-Mar-2022 | GovTechnology Magazine

Article icon

Cloud Security Alliance Launches Zero-Trust Advancement Center

18-Mar-2022 | IT World Canada

Article icon

Vulnerability discovered in CRI-O container engine for Kubernetes

18-Mar-2022 | SDxCentral

Article icon

Cloudflare, CrowdStrike Commingle Endpoint Security With Zero Trust

17-Mar-2022 | Decipher

Article icon

Container Escape Flaw Fixed in CRI-O Runtime Engine

17-Mar-2022 | VentureBeat

Article icon

Cloudflare and CrowdStrike partner to accelerate shift to zero trust security

17-Mar-2022 | SiliconANGLE

Article icon

Cloudflare and CrowdStrike expand relationship with zero trust platform integration

16-Mar-2022 | SecurityWeek

Article icon

Severe Vulnerability Patched in CRI-O Container Engine for Kubernetes

16-Mar-2022 | Inside Cybersecurity

Article icon

Cyber policy leader Schwartz: CISA funding boost shows growing confidence in agency’s mission

16-Mar-2022 | Yahoo Finance Live

Article icon

Russia-Ukraine war: Financial sector 'on high alert' for cyberattacks, Crowdstrike CEO says

15-Mar-2022 | CNBC

Article icon

Cyberattacks are on the rise as hackers use Russia-Ukraine war as a distraction, CrowdStrike CEO says

15-Mar-2022 | TechTarget

Article icon

Container vulnerability opens door for supply chain attacks

15-Mar-2022 | The Register

Article icon

Kubernetes container runtime CRI-O has make-me-root flaw

14-Mar-2022 | SDxCentral

Article icon

CrowdStrike CEO Touts Success Beyond XDR

13-Mar-2022 | MSSP Alert

Article icon

CrowdStrike Invests In Cybersixgill Multi-Tenant Threat Intelligence for MSSPs, Security MSPs

11-Mar-2022 | The Register

Article icon

Cloud Security Alliance tackles zero-trust networking

10-Mar-2022 | CRN

Article icon

CrowdStrike Promotes Michael Rogers To Global Channel Chief

9-Mar-2022 | VentureBeat

Article icon

Zscaler, Okta, CrowdStrike seek to combat zero trust ‘confusion’

8-Mar-2022 | GovInfoSecurity

Article icon

Free Cybersecurity Tools Offered to Hospitals and Utilities

8-Mar-2022 | USA Today

Article icon

Ukraine war could mean Russian attacks on US cyber networks

7-Mar-2022 | Intelligent CIO

Article icon

City of Phoenix deploys endpoint security and services from CrowdStrike

7-Mar-2022 | The Washington Post

Article icon

CrowdStrike, Cloudflare and Ping Identity will protect hospitals, power companies and water utilities free as cyber conflict grows

7-Mar-2022 | Becker's Health IT

Article icon

Cybersecurity companies offering US hospitals free protection

3-Mar-2022 | Protocol

Article icon

How Russian cybersecurity threats reached a small-town Ohio manufacturer

2-Mar-2022 | ChannelBuzz

Article icon

CrowdStrike integrates identity threat protection solution into their MDR to provide industry’s first managed identity protection solution

2-Mar-2022 | SiliconAngle

Article icon

CrowdStrike’s new threat protection suite protects against identity theft

2-Mar-2022 | TechTarget

Article icon

CrowdStrike cracks PartyTicket ransomware targeting Ukraine

2-Mar-2022 | The Register

Article icon

CrowdStrike offers fully managed identity-threat detection

1-Mar-2022 | The Drum

Article icon

With cyberattacks underway in Ukraine, both the public & private sectors face new threats

25-Feb-2022 | TechTarget

Article icon

Researchers find access brokers focused on US targets

25-Feb-2022 | Business Insider

Article icon

US banks are worried about the possibility of a massive Russian cyberattack, says cybersecurity CEO

25-Feb-2022 | TheStreet

Article icon

CrowdStrike: Strike While the Cybersecurity Iron Is Hot?

24-Feb-2022 | Bleeping Computer

Article icon

Network hackers focus on selling high-value targets in the U.S.

24-Feb-2022 | Marketplace

Article icon

Cybersecurity to take center stage as conflict continues in Ukraine Turn on screen reader support

24-Feb-2022 | Bloomberg

Article icon

U.S. Firms Brace for Potential Cyberattacks as Russia Threatens Critics

24-Feb-2022 | CNBC Mad Money

Article icon

CrowdStrike CEO says U.S. bank execs are ‘very concerned’ about Russian cyberattacks

23-Feb-2022 | HealthInfoSecurity

Article icon

Impact of 'Weaponization of Data' Attacks on Healthcare

23-Feb-2022 | Forbes

Article icon

Hackers Sell Backdoors Into A $2 Billion Nonprofit, A Californian Hospital, And Michigan Government

23-Feb-2022 | Dark Reading

Article icon

Tales from the Dark Web, Part 3: How Criminals Monetize Ransomware

23-Feb-2022 | CRN

Article icon

CEO Outlook 2022

22-Feb-2022 | Politico

Article icon

Ukraine prepares to remove data from Russia’s reach

18-Feb-2022 | Axios

Article icon

Hospitals on high alert for cyberattacks

17-Feb-2022 | Fox Business

Article icon

CrowdStrike CEO: Cyber now a critical element of warfare fighting capabilities

17-Feb-2022 | Dark Reading

Article icon

Attackers Hone Their Playbooks, Become More Agile

16-Feb-2022 | CBS News

Article icon

CrowdStrike Details Growing Number of Threats

16-Feb-2022 | CNBC TechCheck

Article icon

Watch CNBC's full interview with George Kurtz, CrowdStrike CEO

16-Feb-2022 | VentureBeat

Article icon

DDoS attack was ‘largest’ ever in Ukraine, Russia suspected

16-Feb-2022 | CNN

Article icon

Ukraine cyberattack is largest of its kind in country's history, says official

16-Feb-2022 | CNN International

Article icon

George Kurtz interview

16-Feb-2022 | Yahoo Finance

Article icon

Cybersecurity 'is an important element' in Russia-Ukraine conflict: CrowdStrike CEO

16-Feb-2022 | The Hill

Article icon

Ukraine says Russia likely to blame for cyberattack

15-Feb-2022 | France24

Article icon

France24 - Adam Meyers, Senior Vice President, Intelligence, CrowdStrike (2/15/22)

15-Feb-2022 | ZDNet (UK)

Article icon

Cybersecurity: These countries are the new hacking threats to fear as offensive campaigns escalate

15-Feb-2022 | IT World Canada

Article icon

Hackers move from initial compromise to a second host in 90 minutes: CrowdStrike

15-Feb-2022 | NextGov

Article icon

Ransomware Attacks Exploded in Number and Scale in 2021, Per Cyber Firm

15-Feb-2022 | Channel Futures

Article icon

CrowdStrike Research Shows Massive Spike in Ransomware-Related Data Leaks

15-Feb-2022 | Campus Technology

Article icon

Data Leaks from Education Ransomware Attacks Doubled in 2021, CrowdStrike Says in Global Threat Report

15-Feb-2022 | CRN

Article icon

The 10 Hottest XDR Security Companies To Watch

9-Feb-2022 | Dark Reading

Article icon

Mitigate Ransomware Risks With Modern Log Management

9-Feb-2022 | Consultancy.com.au

Article icon

Preparing for the cybersecurity threats that await in 2022

8-Feb-2022 | VentureBeat

Article icon

50 security products that customers really love

8-Feb-2022 | CNET

Article icon

As Russia's cyberattacks on Ukraine mount, the risk of impact in other countries rises

8-Feb-2022 | Dark Reading

Article icon

Prioritizing the Right Vulnerabilities to Reduce Risk

8-Feb-2022 | CXOtoday

Article icon

There’s Lack of Awareness on Cybersecurity as a Potential Career Option: CrowdStrike India MD

7-Feb-2022 | CRN

Article icon

2022 Channel Chiefs: The 50 Most Influential

4-Feb-2022 | Sydney Morning Herald

Article icon

Ukraine’s Foreign Minister calls for Australia to impose tougher sanctions on Russia

3-Feb-2022 | Dark Reading

Article icon

Simplifying Zero Trust Security in Healthcare Organizations

2-Feb-2022 | Dark Reading

Article icon

Managing Detections Is Not the Same as Stopping Breaches

2-Feb-2022 | CNN

Article icon

US officials prepare for potential Russian cyberattacks as Ukraine standoff continues

2-Feb-2022 | Wall Street Journal

Article icon

As Ukraine Prepares for Cyberattacks, Officials Warn of Ransomware in Disguise

1-Feb-2022 | Cybersecurity Dive

Article icon

Conflict over Ukraine raises cyber risk for US enterprises

31-Jan-2022 | SecurityWeek

Article icon

More Russian Attacks Against Ukraine Come to Light

28-Jan-2022 | Security Senses

Article icon

Experts offer advice for Data Protection and Privacy Day 2022

28-Jan-2022 | C4IRSNET

Article icon

DoD must focus on skilled cyber defenders, not just new tech, warns weapons tester

27-Jan-2022 | TechTarget

Article icon

SolarWinds hackers still active, using new techniques

27-Jan-2022 | Bleeping Computer

Article icon

Russian APT29 hackers' stealthy malware undetected for years

24-Jan-2022 | VentureBeat

Article icon

Major attacks using Log4j vulnerability ‘lower than expected’

24-Jan-2022 | Bloomberg

Article icon

Major Hacks Have Cooled, But No One Is Celebrating Yet

24-Jan-2022 | Dark Reading

Article icon

Tales from the Dark Web, Part 2: Ransomware Stacked With Distribution Services Creates the Perfect Storm

21-Jan-2022 | Cybersecurity Dive

Article icon

Ukraine tensions raise cyberthreats against US companies, critical infrastructure.

21-Jan-2022 | FCW

Article icon

Strengthening identity-based security with zero trust

21-Jan-2022 | Dark Reading

Article icon

Fraud Is On the Rise, and It's Going to Get Worse

20-Jan-2022 | CSO

Article icon

Biden memo aims to bolster cybersecurity in national security systems

20-Jan-2022 | ZDNet

Article icon

Biden warns of US 'cyber' response after Ukraine says computers wiped during attack

20-Jan-2022 | eSecurity Planet

Article icon

Attacks Escalating Against Linux-Based IoT Devices

20-Jan-2022 | SecurityWeek

Article icon

Cyber Insights 2022: Nation-States

18-Jan-2022 | CyberScoop

Article icon

Ransomware isn’t always about gangs making money. Sometimes it’s about nations manufacturing mayhem.

17-Jan-2022 | RetailBiz

Article icon

Five cybersecurity predictions for 2022

17-Jan-2022 | ZDNet

Article icon

Linux malware is on the rise. Here are three top threats right now

15-Jan-2022 | TechRadar Pro

Article icon

Malware targeting Linux systems hit a new high in 2021

13-Jan-2022 | Campus Technology

Article icon

Why Phishing Still Works (and What to Do About It)

11-Jan-2022 | Washington Post

Article icon

One month in, there aren’t any huge, known log4j hacks

6-Jan-2022 | CNBC Closing Bell

Article icon

There’s massive opportunity for cybersecurity, says Crowdstrike CEO

5-Jan-2022 | TechRadar

Article icon

The sophistication of underground eCrime laid bare

4-Jan-2022 | Cybersecurity Dive

Article icon

Log4j activity expected to play out well into 2022

2-Jan-2022 | Datamation

Article icon

Top Cloud Security Trends 2022

30-Dec-2021 | Threatpost

Article icon

APT ‘Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools

29-Dec-2021 | SCMedia

Article icon

Chinese espionage group leveraged Log4j bug in VMware

29-Dec-2021 | VentureBeat

Article icon

China-based group used Log4j flaw in attack, CrowdStrike says

29-Dec-2021 | SecurityWeek

Article icon

Chinese Spies Exploit Log4Shell to Hack Major Academic Institution

28-Dec-2021 | SC Media

Article icon

CrowdXDR Alliance adds 3 organizations

27-Dec-2021 | CBS News

Article icon

Cybersecurity experts explains “Log4j” vulnerability, discusses top cyber threats of 2022

23-Dec-2021 | SDxCentral

Article icon

Cloudflare, Armis Join CrowdStrike’s XDR Alliance

23-Dec-2021 | ZDNet

Article icon

Multiple Log4j scanners released by CISA, CrowdStrike

22-Dec-2021 | ZDNet

Article icon

Ransomware in 2022: We're all screwed

17-Dec-2021 | Dark Reading

Article icon

Time to Reset the Idea of Zero Trust

16-Dec-2021 | Security Boulevard

Article icon

Trust in Legacy Vendors Sinks as Ransomware Spikes

16-Dec-2021 | Redmond Magazine

Article icon

Log4j Attack Methods Explained by CrowdStrike

15-Dec-2021 | Wall Street Journal

Article icon

Hackers Backed by China Seen Exploiting Security Flaw in Internet Software

15-Dec-2021 | Inside Cybersecurity

Article icon

Tech group urges NIST to streamline supply chain risk publication addressing cyber EO requirements

14-Dec-2021 | IT Visionaries

Article icon

Security Straight Talk with Jim Alkove, Chief Trust Officer at Salesforce, and George Kurtz, President/CEO and co-founder of CrowdStrike

14-Dec-2021 | Dark Reading

Article icon

Attackers Target Log4j to Drop Ransomware, Web Shells, Backdoors

14-Dec-2021 | ZDNet

Article icon

Khonsari ransomware, Nemesis Kitten are exploiting Log4j vulnerability

14-Dec-2021 | Redmond Channel Partner

Article icon

Report: Orgs Losing Trust in 'Legacy' Software Providers

14-Dec-2021 | Redmond Magazine

Article icon

CrowdStrike Suggests 63 Percent of Orgs Losing Trust in 'Legacy' Software Providers Like Microsoft

13-Dec-2021 | Investor's Business Daily

Article icon

Why Cybersecurity Stocks Could See More Upside From Ransomware Attacks

13-Dec-2021 | Dark Reading

Article icon

XDR: What It Is, What It Isn't

13-Dec-2021 | Dark Reading

Article icon

Tales from the Dark Web: Fingerprinting Access Brokers on Criminal Forums

11-Dec-2021 | Mashable

Article icon

It's already attacked 'Minecraft': The race is on to fix the biggest PC vulnerability in years

10-Dec-2021 | Associated Press

Article icon

‘The internet’s on fire’ as techs race to fix software flaw

10-Dec-2021 | CPO Magazine

Article icon

Legacy IT Vendors Losing Trust as Supply Chain Attacks, Ransomware Attacks Run Rampant

8-Dec-2021 | Yahoo Finance

Article icon

Crowdstrike CEO: Companies are 'losing trust' in Microsoft and others amid deluge of cyber threats

8-Dec-2021 | Cybersecurity Dive

Article icon

Is the security of legacy IT providers prompting a confidence crisis?

8-Dec-2021 | Washington Times

Article icon

Survey: 63% of businesses have lost faith in Microsoft to protect their data

7-Dec-2021 | Bloomberg Technology

Article icon

CrowdStrike CEO: Microsoft's Software Causes Cyber Security Issues

2-Dec-2021 | CNBC

Article icon

CrowdStrike CEO talks up the company’s cloud-native technology’s ability to adapt

2-Dec-2021 | Intelligence Community News

Article icon

CISA selects CrowdStrike to support EDR initiative

1-Dec-2021 | SiliconANGLE

Article icon

CrowdStrike unveils new service integrations for Falcon unified security platform

1-Dec-2021 | TechTarget

Article icon

CISA taps CrowdStrike for endpoint security

1-Dec-2021 | ZDNet

Article icon

CrowdStrike chosen by CISA for government endpoint security initiative

1-Dec-2021 | ZDNet

Article icon

Amazon Web Services, CrowdStrike and Presidio partner for ransomware mitigation kit

1-Dec-2021 | MSSP Alert

Article icon

CrowdStrike Gains MSSP Partner Momentum; CEO Dismisses Fear, Uncertainty, Doubt

29-Nov-2021 | The Cyber Jack Podcast

Article icon

How the Complexity of the Stack Kills Security - CrowdStrike, Amol Kulkarni

26-Nov-2021 | Washington Times

Article icon

Cybersecurity forecast warns of Cyber Monday attacks

25-Nov-2021 | CPO Magazine

Article icon

Under Siege: How Healthcare Organizations Can Fight Back

24-Nov-2021 | Security Brief

Article icon

CrowdStrike tops list of most valuable public cybersecurity firms on Deloitte Fast 500

23-Nov-2021 | SC Media

Article icon

CrowdStrike eCrime Index points to rising holiday threats

22-Nov-2021 | IT News

Article icon

Case Study: Ransomware fears drove cyber security investments at Flinders University

22-Nov-2021 | Daily Beast

Article icon

North Korean Hackers Caught Snooping on China’s Cyber Squad

19-Nov-2021 | SC Media

Article icon

As XDR trend gains steam, new alliance seeks ‘shared schema’ for data exchange

19-Nov-2021 | ComputerWeekly

Article icon

Why is Emotet back, and should we be worried about it?

19-Nov-2021 | Cybernews

Article icon

Austin Murphy, CrowdStrike: ‘threat actors are getting bolder, stakes are higher”

17-Nov-2021 | AP

Article icon

Iran-backed hackers accused of targeting critical US sectors

17-Nov-2021 | Managed.IT

Article icon

The Emotet botnet, once of the world’s most dangerous malware, has returned and is being installed onto Windows machines

17-Nov-2021 | CISO Magazine

Article icon

Emotet Botnet Resurfaces via TrickBot

17-Nov-2021 | Information Age

Article icon

The Emotet malware botnet has returned

17-Nov-2021 | Cybersecurity Connect

Article icon

Emotet: World's Most Dangerous Malware Returns

16-Nov-2021 | Dark Reading

Article icon

Emotet Makes a Comeback

12-Nov-2021 | Dark Reading

Article icon

Open Source Project Aims to Detect Living-Off-the-Land Attacks

12-Nov-2021 | ExecutiveBiz

Article icon

FBI Issues Warning to US Companies Over Iranian Hackers Targeting Stolen Data

12-Nov-2021 | SiliconANGLE

Article icon

UiPath details customer-centric approach to building its automation platform

11-Nov-2021 | CNN

Article icon

FBI warns US companies about Iranian hackers

11-Nov-2021 | ITWeb

Article icon

Cyber security webinar to expose the Dark Web

9-Nov-2021 | eeNews Europe

Article icon

Rockwell Automation taps Israel for global cybersecurity centre

9-Nov-2021 | Drives & Controls

Article icon

Rockwell sets up cybersecurity centre and adds partners

9-Nov-2021 | IT Brief

Article icon

UiPath powers automation journeys with latest platform release

9-Nov-2021 | HelpNetSecurity

Article icon

Rockwell Automation announces investments to enhance its incident response services

9-Nov-2021 | ARN

Article icon

Nextgen signs Quest Software and One Identity in A/NZ

9-Nov-2021 | Business Insider

Article icon

The list of 100 people transforming business in 2021

9-Nov-2021 | Express Computer

Article icon

Ten years of cybersecurity

8-Nov-2021 | ET CIO

Article icon

Cybersecurity is the digital equivalent to business risk

8-Nov-2021 | Security News Desk

Article icon

Cybersecurity Month 2021

8-Nov-2021 | TechTarget

Article icon

REvil ransomware affiliates arrested in international takedown

8-Nov-2021 | AiThority

Article icon

UiPath Brings Best-in-Class UI and API Automation Together and Strengthens Enterprise Scale in 2021.10 Platform Release

5-Nov-2021 | Voice&Data

Article icon

Voice&Data Talkies #3: Adam Meyers, Senior VP, Intelligence, CrowdStrike

5-Nov-2021 | ZDNet

Article icon

CIS partners with CrowdStrike on cybersecurity platform protecting local governments

5-Nov-2021 | CRN

Article icon

5 Companies That Came To Win This Week

4-Nov-2021 | Security Review Magazine

Article icon

Video: Protecting Beyond the Endpoint | Crowdstrike @ GITEX Global 2021

4-Nov-2021 | Channel Partner Insight

Article icon

CrowdStrike swallows SecureCircle to ramp up endpoint security

4-Nov-2021 | Digitalisation World

Article icon

CrowdStrike to acquire SecureCircle

4-Nov-2021 | Homeland Security Today

Article icon

Center for Internet Security Selects CrowdStrike as Premier Partner for Endpoint Security

4-Nov-2021 | StateScoop

Article icon

State, local governments gain new way to protect network endpoints

3-Nov-2021 | ExecutiveBiz

Article icon

FedRAMP Board Prioritizes 5 Cloud Vendors for Provisional Authorization Process

3-Nov-2021 | IT Europa

Article icon

CrowdStrike buys SaaS-based security vendor SecureCircle

3-Nov-2021 | SC Media

Article icon

CrowdStrike says Falcon Horizon will now support Google Cloud

2-Nov-2021 | Cyber Risk Leaders

Article icon

CrowdStrike to Acquire SecureCircle to Enforce Zero Trust Data Protection

2-Nov-2021 | Security Brief

Article icon

CrowdStrike acquires SecureCircle, extends zero trust endpoint solution

2-Nov-2021 | CyberWire

Article icon

Daily Briefing

2-Nov-2021 | Security Week

Article icon

CrowdStrike to Buy Zero Trust Data Encryption Firm SecureCircle

2-Nov-2021 | Infosecurity Outlook

Article icon

CrowdStrike Acquires SecureCircle to Extend Zero Trust Data Protection

2-Nov-2021 | Fortune

Article icon

Term Sheet Newsletter

2-Nov-2021 | AiThority

Article icon

CrowdStrike to Acquire SecureCircle to Enforce Zero Trust Data Protection

1-Nov-2021 | ZDNet

Article icon

CrowdStrike acquires SaaS-based cybersecurity service SecureCircle

1-Nov-2021 | VMBlog

Article icon

CrowdStrike to Acquire SecureCircle to Enforce Zero Trust Data Protection

1-Nov-2021 | MSSP Alert

Article icon

CrowdStrike Acquiring SecureCircle; MSSPs May Gain Zero Trust Data Security

1-Nov-2021 | Dark Reading

Article icon

CrowdStrike to Buy Zero-Trust SaaS Provider

1-Nov-2021 | CRN

Article icon

CrowdStrike To Buy Data Protection Startup SecureCircle

28-Oct-2021 | Telecom Review

Article icon

CrowdStrike helps telecom sector in Middle East fight cyber threats with identity-centric zero-trust architecture

20-Oct-2021 | ZDNet

Article icon

These stealthy hackers avoid Windows but target Linux as they look to steal phone data

20-Oct-2021 | The Register

Article icon

Crims target telcos' Linux and Solaris boxes, which don't get enough infosec love

20-Oct-2021 | The Hacker News

Article icon

LightBasi Hackers Breach at Least 13 Telecom Service Providers Since 2019

20-Oct-2021 | Techzine

Article icon

How an undetected hack group tapped telecom data for 5 years straight

20-Oct-2021 | TechTarget

Article icon

LightBasin' hackers spent 5 years hiding on telco networks

20-Oct-2021 | Security Affairs

Article icon

China-linked LightBasin group accessed calling records from telcos worldwide

20-Oct-2021 | Republic World

Article icon

Suspected Chinese Hackers Hit As Many As 13 Phone Companies Since 2019, Say Experts

20-Oct-2021 | Infosecurity Magazine

Article icon

LightBasin Operation Compromises 13 Global Telcos in Two Years

20-Oct-2021 | CyberWire

Article icon

LightBasin collects user data from telco infrastructure. Consent by contract. UPMC hacker sentenced. Ransomware hits candy company.

20-Oct-2021 | LightBasin hackers breach 13 telcos in two years

Article icon

LightBasin hackers breach 13 telcos in two years

19-Oct-2021 | CXOtoday

Article icon

How Startups Can Create a Cyber-Aware Work Culture

19-Oct-2021 | Security Brief

Article icon

CrowdStrike brings 'observability to everyone' with Humio release

19-Oct-2021 | The Register

Article icon

JumpCloud hooks investment from Atlassian Ventures and CrowdStrike Falcon® Fund for $225m total funding round

19-Oct-2021 | UPI

Article icon

Sophisticated hacking group targeted at least 13 phone companies since 2016

19-Oct-2021 | Washington Times

Article icon

Cybersecurity firm says Chinese digital spies have hacked telecom data

19-Oct-2021 | Washington Post

Article icon

U.S. cyber czar wants industry to collaborate with government

19-Oct-2021 | The Hill

Article icon

Potential Chinese hackers targeting telecommunications companies

19-Oct-2021 | The Guardian

Article icon

At least 13 phone firms hit by suspected Chinese hackers since 2019, say experts

19-Oct-2021 | Daily Caller

Article icon

Hacking Group Is Stealing Personal Data, Communications From Telecom Carriers, Researchers Find

19-Oct-2021 | Sky News

Article icon

Mysterious hacking group is quietly breaking into global telecommunications networks, research finds

19-Oct-2021 | Silicon.co.uk

Article icon

Hacker Group Linked To China Compromising Global Telecom Networks

19-Oct-2021 | SC Media

Article icon

CrowdStrike names cluster that’s breached over a dozen telcos since 2019

19-Oct-2021 | Reuters

Article icon

China-linked hacking group accessing calling records worldwide, CrowdStrike says

19-Oct-2021 | POLITICO

Article icon

Cruz won't let Biden turn over Leaf

19-Oct-2021 | Light Reading

Article icon

Hacking group LightBasin broke into at least 13 mobile networks – report

19-Oct-2021 | Homeland Security Today

Article icon

LightBasin: A Roaming Threat to Telecommunications Companies

19-Oct-2021 | Gizmodo

Article icon

A Cybercrime Group Has Been Hacking Telecoms to Steal Phone Records All Over the World

19-Oct-2021 | Fuentitech

Article icon

LightBasin hackers break into 13 telcos in two years

19-Oct-2021 | Decipher

Article icon

Telecom Firms Compromised in LightBasin Cyberattacks

19-Oct-2021 | Dark Reading

Article icon

Telecommunications Providers Worldwide Are Targeted in Sophisticated Cyber-Espionage Campaign

19-Oct-2021 | CyberScoop

Article icon

A China-aligned espionage group is targeting global telecoms, sweeping up call data dating back years

19-Oct-2021 | Bleeping Computer

Article icon

LightBasin hacking group breaches 13 global telecoms in two years

18-Oct-2021 | Built In

Article icon

What Is Work Culture? How to Build a Positive Environment.

15-Oct-2021 | Security Brief

Article icon

Zscaler and CrowdStrike deepen zero trust integrations

15-Oct-2021 | IT Ops Times

Article icon

CrowdStrike launches Humio Community Edition

14-Oct-2021 | Cybersecurity Connect

Article icon

Zscaler Joins CrowdStrike's CrowdXDR Alliance

14-Oct-2021 | Digitalisation World

Article icon

CrowdStrike joins forces for XDR initiative

14-Oct-2021 | Digitalisation World

Article icon

Cybersecurity conference highlights cloud, XDR, observability, SOAR, endpoint and workload security

14-Oct-2021 | ZDNet

Article icon

This is how Formula 1 teams fight off cyberattacks

14-Oct-2021 | 20VC Podcast

Article icon

20VC: Crowdstrike Founder, George Kurtz on Scaling to a $60Bn Market Cap, How to Acquire and Retain the World’s Best Talent & The Right Way to View Competition in Today’s Market?

13-Oct-2021 | News Update

Article icon

Google Cybersecurity Action Team Springs Into Life

13-Oct-2021 | MSSP Alert

Article icon

Managed Services Provider (MSSP) News: 13 October 2021,

13-Oct-2021 | MSSP Alert

Article icon

CrowdStrike Fal.Con 2021: Eight XDR SOAR Security Takeaways for MSSPs

13-Oct-2021 | Cybers Guards

Article icon

CrowdStrike Launching a Free Community Edition of Humio and CROWDSTRIKE FALCON® XDR

13-Oct-2021 | DQ Channels

Article icon

CrowdStrike Launches XDR and Humio Community Edition

13-Oct-2021 | CompsMag

Article icon

CrowdStrike Redefines True XDR With Humio Acquisition

13-Oct-2021 | Computer Weekly

Article icon

Google Cybersecurity Action Team springs into life

12-Oct-2021 | ZDNet

Article icon

Google unveils new security programs, 'Cybersecurity Action Team' and partnerships with CrowdStrike, Palo Alto

12-Oct-2021 | SiliconANGLE

Article icon

UiPath and CrowdStrike combine forces to protect robot workers from cyberattack

12-Oct-2021 | SDxCentral

Article icon

Google Activates Cybersecurity Action Team at Cloud Next

12-Oct-2021 | Security Week

Article icon

CrowdStrike Launches CROWDSTRIKE FALCON® XDR, Free Edition of Humio Data Platform

12-Oct-2021 | MSSP Alert

Article icon

XDR Security Market Flooded With Options, But Are They MSSP Ready? - MSSP Alert

12-Oct-2021 | Dark Reading

Article icon

New CrowdXDR Alliance Defines Data Exchange Standard for XDR

12-Oct-2021 | APMdigest

Article icon

CrowdStrike Launches Free Humio Community Edition

11-Oct-2021 | CIO

Article icon

UiPath partners with CrowdStrike to secure SaaS workflow automation

7-Oct-2021 | AiThority

Article icon

UiPath to Launch New Innovations for Faster, More Secure Automations and Deeper Integration within Enterprise Environments

6-Oct-2021 | Security Week

Article icon

What's in a Threat Group Name? An Inside Look at the Intricacies of Nation-State Attribution

6-Oct-2021 | CNN

Article icon

Russian hackers behind SolarWinds hack are trying to infiltrate US and European government networks

5-Oct-2021 | SiliconANGLE

Article icon

UiPath partners with CrowdStrike to increase confidence in automation security

5-Oct-2021 | MSSP Alert

Article icon

CrowdStrike, UiPath Converge Security and Robotic Process Automation,

5-Oct-2021 | Computer Weekly

Article icon

UiPath Forward IV: A technology conference keynote, In Real Life (IRL)

5-Oct-2021 | Forbes

Article icon

UiPath Toughens Software Robots As Core Platform Widens

4-Oct-2021 | BizTech

Article icon

CDW Tech Talk Explains How to Secure Your Data All the Way to the Endpoint

4-Oct-2021 | Wall Street Journal

Article icon

Irish Police Say Europol, Interpol Helped Dismantle Hackers’ Infrastructure

30-Sep-2021 | The Farmer

Article icon

Cyber attackers look for a tree change

30-Sep-2021 | FedTech

Article icon

EDR vs. MDR: What Are Managed and Endpoint Detection and Response?

29-Sep-2021 | The Drill Down Podcast

Article icon

Ep. 106: Crowdstrike CEO George Kurtz, Dollar Tree, EQT Corporation, Lightspeed Commerce, Evergrande

29-Sep-2021 | S&P Global Market Intelligence

Article icon

CrowdStrike executive details next-generation cybersecurity needs, threats

29-Sep-2021 | TechTarget

Article icon

Ransomware: Has the U.S. reached a tipping point?

28-Sep-2021 | Enterprise Storage Forum

Article icon

Best Threat Intelligence Platforms & Tools 2021

28-Sep-2021 | ITP.net

Article icon

CrowdStrike accelerates security response times for government agencies

28-Sep-2021 | FOX News Radio - Everyone Talks to Liz Claman Podcast

Article icon

Striking Gold Against All Odds: CrowdStrike CEO George Kurtz

27-Sep-2021 | Australian Financial Review

Article icon

Creaking systems leave Aussie businesses wide open to cyber attack

24-Sep-2021 | Forbes Technology Council

Article icon

Ransomware: Double The Trouble In 2021

24-Sep-2021 | Top Business Tech

Article icon

17 IT leaders on why your organization needs zero trust, with tips on implementation

23-Sep-2021 | Express Computer

Article icon

Session by Vivek Srivastava, Regional Sales Director – India & SAARC, CrowdStrike

23-Sep-2021 | Datamation

Article icon

How Data Security is Used by Air Canada, Siemens Switzerland, US Signal, Farm Bureau Bank, and CTOS: Business Case Studies

23-Sep-2021 | Datamation

Article icon

How Cloud Security is Used by Mercedes-AMG, Akamai, Qlik, Corix, and OneLink: Business Case Studies

23-Sep-2021 | Datamation

Article icon

How Cybersecurity is Used by FedEx, Batteries Plus, TDK, US Signal, and Drax: Business Case Studies

20-Sep-2021 | Potomac Officer's Club

Article icon

CrowdStrike Falcon® Forensics Gains FedRAMP Authorization

20-Sep-2021 | ExecutiveBiz

Article icon

CrowdStrike’s Falcon Forensics Platform Receives FedRAMP Authorization

19-Sep-2021 | Homeland Security Today

Article icon

CrowdStrike Announces Falcon Forensics on GovCloud

17-Sep-2021 | TechGig

Article icon

CrowdStrike announces Falcon Forensics on GovCloud

17-Sep-2021 | CRN India

Article icon

CrowdStrike speeds response time and remediation of critical security incidents for Govt agencies

17-Sep-2021 | TechRadar Pro

Article icon

How cyber resilience will reshape cybersecurity

17-Sep-2021 | Insurance Business UK

Article icon

Wake-up calls and eye-opening statistics reveal the full extent of cyber risk

16-Sep-2021 | CyberWire

Article icon

V10 | Issue 179 |DDoS hits German election agency. South African recovery from ransomware. Cybergangs threaten data loss. Cyber insurance trend

16-Sep-2021 | Professional Security Magazine

Article icon

Securing the transformed business

16-Sep-2021 | The Age

Article icon

China responsible for two thirds of state-sponsored cyber attacks

15-Sep-2021 | Asia Insurance Review

Article icon

Attempted cyber intrusions up 60% in 2021

14-Sep-2021 | CISO Magazine

Article icon

Overcoming the Challenges of Executing a Remote Security Policy

14-Sep-2021 | Cyber Risk Leaders

Article icon

CrowdStrike has released its 2021 Threat Hunting Report

14-Sep-2021 | CRN India

Article icon

CrowdStrike reveals a surge in adversary activity in their annual threat hunting report

13-Sep-2021 | Datamation

Article icon

CrowdStrike Introduces Managed Service for Digital Risk Protection

13-Sep-2021 | CSO Online

Article icon

Human errors compromising Australian government data more than cybercriminals

13-Sep-2021 | IDG Connect

Article icon

Beginning a more mature conversation about cybersecurity

13-Sep-2021 | GovTech

Article icon

As Cyber Money Comes in, Don't Miss the Forest for the Trees

11-Sep-2021 | Datamation

Article icon

Cybersecurity Report Reveals 60% Jump in Attempted Intrusions

10-Sep-2021 | IT Pro

Article icon

Medigate and CrowdStrike bolster IoT medical device security

10-Sep-2021 | Meritalk

Article icon

Report: Adversaries are Moving Beyond Malware

10-Sep-2021 | Global Association of Risk Professionals

Article icon

The Path Toward Cyber Resiliency: A Q&A with CrowdStrike’s Shawn Henry

10-Sep-2021 | Comms Business

Article icon

Using feedback to evolve

10-Sep-2021 | CNN

Article icon

Ransomware group that carried out major attacks reappears after brief absence

10-Sep-2021 | Dataquest India

Article icon

Women are unique and what they bring to the table, others can’t: Jhilmil Kochar, MD, CrowdStrike India

9-Sep-2021 | ITWeb

Article icon

CrowdStrike Falcon® Intelligence Recon+ expands unmatched threat intelligence suite, delivering managed protection against dark web threats, digital risk

9-Sep-2021 | CXOtoday

Article icon

Attacks on Telcos, Cryptos on the Rise, Finds CrowdStrike Threat Report

9-Sep-2021 | Digitalisation World

Article icon

Adversaries are accelerating targeted access to critical networks

9-Sep-2021 | Intelligent CISO

Article icon

New research reveals adversaries are accelerating targeted access to critical networks three times faster than before

9-Sep-2021 | TechCentral.ie

Article icon

REvil ransomware gang resurfaces after brief disappearance

9-Sep-2021 | Defence Connect

Article icon

China, North Korea, Iran behind bulk of state-sponsored attacks

9-Sep-2021 | Dark Reading

Article icon

REvil Ransomware Group's Sudden Re-emergence Sparks Concerns

9-Sep-2021 | Infosecurity Magazine

Article icon

Attacker Breakout Time Now Less Than 30 Minutes

8-Sep-2021 | The Washington Post

Article icon

The Cybersecurity 202: Ransomware threats barrel back after a slow Labor Day

8-Sep-2021 | THE Journal

Article icon

Education Sector Sees Massive Surge in Intrusions

8-Sep-2021 | CyberWire

Article icon

"V10 | Issue 173 | Share on LinkedInShare on FacebookShare on Twitter Consider disabling ActiveX. BladeHawk cyberespionage targeting Kurds. Post-Labor Day, ransomware gangs are stirring."

8-Sep-2021 | Nextgov

Article icon

Report: Hackers Shift from Malware to Credential Hijacking

8-Sep-2021 | Homeland Security Today

Article icon

CrowdStrike Reports Broad 60 Percent Increase in Attempted Cyber Intrusions

8-Sep-2021 | Campus Technology

Article icon

IT Security Intrusions on the Rise in Education Sector

8-Sep-2021 | TechTarget

Article icon

CrowdStrike threat report: Breakout time decreased 67% in 2021

8-Sep-2021 | Dark Reading

Article icon

Attackers Moving Faster Inside Target Networks

8-Sep-2021 | CyberScoop

Article icon

Russian cybercrime continues as government-backed attacks on companies dwindle, CrowdStrike says

7-Sep-2021 | Information Age

Article icon

Australia has a ransomware problem

7-Sep-2021 | SC Media

Article icon

REvil reawakening? ‘Happy Blog’ leak site returns

7-Sep-2021 | Bloomberg

Article icon

Notorious Russian Ransomware Group ‘REvil’ Has Reappeared

3-Sep-2021 | Utility + Function

Article icon

S2. E18. George Kurtz - Thrill of Entrepreneurship

2-Sep-2021 | 20VC

Article icon

20VC: The Crowdstrike Memo: Accel’s Sameer Gandhi on Leading Multiple Internal Rounds for Crowdstrike, Telling George Kurtz to Go Shop His Term Sheet, How To Think Through Market Sizing & The Importance of Speed of Execution and Knowing When To Go Slow To Go Fast

31-Aug-2021 | SC Media

Article icon

After a lucrative year, what will ransomware groups do with newfound capital?

31-Aug-2021 | CRN

Article icon

Fortune 500 Firm Drops Microsoft For CrowdStrike After Attack

26-Aug-2021 | Express Computer

Article icon

Panel Discussion: Best practices to protect critical infrastructure from sophisticated cyber attacks ~ Digital Technology Sabha 2021

25-Aug-2021 | Channel Futures

Article icon

Alert Logic, Arctic Wolf, CrowdStrike Named Among MDR Leaders

25-Aug-2021 | IT Business Edge

Article icon

Top EDR Tools & Software 2021

25-Aug-2021 | Express Computer

Article icon

"Scott Jarkoff, Director, Strategic Threat Advisory Group, APJ & EMEA, CrowdStrike | Digital Technology Sabha 2021 "

24-Aug-2021 | Technology Decisions

Article icon

Data breaches fall 16% in first half of 2021

24-Aug-2021 | Tech Channel

Article icon

It is time to put your new Covid-19 incident response plans into practice

24-Aug-2021 | AiThority

Article icon

CrowdStrike Named a Leader in IDC MarketScape: US Managed Detection & Response Services

24-Aug-2021 | GCN

Article icon

Endpoint protection: Securing the pieces that make up the whole

23-Aug-2021 | Which-50

Article icon

Latest Australian Data Breach Report

22-Aug-2021 | Business Today

Article icon

Bypassing the Password

20-Aug-2021 | Cybersecurity Connect

Article icon

MIMECAST AND CROWDSTRIKE’S HUMIO API INTERGRATION TO BOOST CYBER RESILIENCE

20-Aug-2021 | Solutions Review

Article icon

The 5 Coolest Endpoint Security CEOs of 2021

19-Aug-2021 | Intelligent CISO

Article icon

Would criminalising ransomware payments be a positive move for businesses?

19-Aug-2021 | Beyond!

Article icon

Cinthia Portugal: Leading Humio Marketing at CrowdStrike to Reach the Next Level and Beyond

18-Aug-2021 | Channel Post

Article icon

Remote cyber and IT support in the age of working-from-anywhere

17-Aug-2021 | My Broadband

Article icon

Transnet ransomware hackers did not get a single cent

17-Aug-2021 | CStore Decisions

Article icon

What the Ransomware Attacks Mean for Convenience Retailers

16-Aug-2021 | Redmond Magazine

Article icon

Windows Print Spooler Flaws Leveraged in Ransomware Attacks

16-Aug-2021 | POLITICO

Article icon

Extending remote work strains companies’ security teams

14-Aug-2021 | PC Magazine

Article icon

Night Terrors: Ransomware Campaigns Are Exploiting PrintNightmare

13-Aug-2021 | The Hacker News

Article icon

Ransomware Gangs Exploiting Windows Print Spooler Vulnerabilities

13-Aug-2021 | Channel News

Article icon

Windows 10 PrintNightmare Returns

13-Aug-2021 | Bank Info Security

Article icon

Ransomware Gangs Try to Exploit 'PrintNightmare' Flaws

13-Aug-2021 | ZDNet

Article icon

Ransomware: Now attackers are exploiting Windows PrintNightmare vulnerabilities

13-Aug-2021 | CyberScoop

Article icon

Multiple ransomware gangs pounce on 'PrintNightmare' vulnerability

12-Aug-2021 | Windows Central

Article icon

Windows 10 PrintNightmare isn't over after all, and ransomware attackers are taking note

12-Aug-2021 | Bleeping Computer

Article icon

Ransomware gang uses PrintNightmare to breach Windows servers

12-Aug-2021 | Top Business Tech

Article icon

CTOs share advice to their 25-year-old selves

12-Aug-2021 | Recorded Future

Article icon

PrintNightmare vulnerability weaponized by Magniber ransomware gang

11-Aug-2021 | Cheddar

Article icon

CrowdStrike's Best Practices for Cybersecurity With Ransomware Attacks on the Rise

10-Aug-2021 | Defense Systems

Article icon

CISA launches joint cyber defense effort

9-Aug-2021 | CRN

Article icon

CrowdStrike CEO George Kurtz Takes Big Swings At Microsoft, SentinelOne

9-Aug-2021 | CRN

Article icon

Strike First, Strike Hard: How George Kurtz Has Built CrowdStrike Into A Cybersecurity Powerhouse

6-Aug-2021 | Inside Cybersecurity

Article icon

CISA’s new ‘collaborative’ group draws praise from Solarium Commission members

6-Aug-2021 | MSSP Alert

Article icon

Black Hat 2021 Cybersecurity Conference Live Blog: MDR, XDR and MSSP Updates

6-Aug-2021 | GCN

Article icon

CISA launches joint cyber defense effort

6-Aug-2021 | Forbes

Article icon

U.S. Government Signs Up Tech Giants For New Cyber Defense Project

5-Aug-2021 | TechNadu

Article icon

‘Prophet Spider’ Now Targeting Old Oracle WebLogic RCE Vulnerabilities

5-Aug-2021 | Security Boulevard

Article icon

Ransomware Gangs and the Name Game Distraction

5-Aug-2021 | AFCEA

Article icon

Introducing the Joint Cyber Defense Collaborative

5-Aug-2021 | IDG Channel Asia

Article icon

Channel Asia Women in ICT Awards: and the winners are...

5-Aug-2021 | FCW

Article icon

CISA launches new initiative to combat ransomware

5-Aug-2021 | Federal News Network

Article icon

CISA looks to tie together public-private partnerships through new cyber planning office

5-Aug-2021 | ZDNet

Article icon

CISA to partner with Amazon, Google, Microsoft, Verizon, AT&T and more for cyberdefense initiative

5-Aug-2021 | CyberScoop

Article icon

CISA director unveils cyber defense collaborative center for pre-attack planning

5-Aug-2021 | Wall Street Journal

Article icon

New Hacking Group Shows Similarities to Gang That Attacked Colonial Pipeline

5-Aug-2021 | Wall Street Journal

Article icon

U.S. Taps Amazon, Google, Microsoft, Others to Help Fight Ransomware, Cyber Threats

5-Aug-2021 | CNBC

Article icon

Amazon, Google and other tech companies join government effort to fight ransomware

4-Aug-2021 | Smart Company

Article icon

Great Place to Work reveals Australia’s Best Workplaces of 2021

4-Aug-2021 | CRN

Article icon

The 20 Hottest Cybersecurity Products At Black Hat 2021

2-Aug-2021 | CRN

Article icon

The 25 Most Influential Executives Of 2021

30-Jul-2021 | Sydney Morning Herald

Article icon

‘Death Kitty’ ransomware appears to hit South African ports

29-Jul-2021 | Cybersecurity Connect

Article icon

CrowdStrike Expands Threat Intelligence Leadership

29-Jul-2021 | MSSP Alert

Article icon

Managed Security Services Provider (MSSP) News: 29 July 2021

28-Jul-2021 | CRN

Article icon

Westcon-Comstor CEO on cloud marketplace strategy, 'chippageddon' and insolvency risks post-Covid

27-Jul-2021 | Telecom TV

Article icon

Telefónica Tech partners with CrowdStrike to strengthen the digital protection of its clients

27-Jul-2021 | Telecoms

Article icon

Eurobites: KPN turns a corner in Q2

27-Jul-2021 | Telecompaper

Article icon

Telefonica Tech inks digital protection deal with CrowdStrike

27-Jul-2021 | ZDNet

Article icon

Malware developers turn to 'exotic' programming languages to thwart researchers

23-Jul-2021 | Nextgov

Article icon

Commerce Secretary Highlights Cybersecurity Workforce Needs With $3B Initiative

22-Jul-2021 | Cybersecurity Connect

Article icon

CrowdStrike Falcon® to Boost GovCloud Endpoint Protection

22-Jul-2021 | EdScoop

Article icon

Harmonized' IT systems can diffuse cyber risk, says Duke services director

18-Jul-2021 | Security Brief

Article icon

Almost half of APAC organisations believe they lack necessary security talent - CrowdStrike research

17-Jul-2021 | Fintech Times

Article icon

CrowdStrike: How Incident Response Is Vital for Financial Institutions in the Covid-19 Environment

17-Jul-2021 | Metro

Article icon

The rise of ransomware: the multibillion pound hacking industry where no one is safe

16-Jul-2021 | Fortune

Article icon

100 Best Large Workplaces for Millennials (#17)

16-Jul-2021 | ABC News

Article icon

Australian organisations are quietly paying hackers millions in a 'tsunami of cyber crime'

15-Jul-2021 | Tahawul Tech

Article icon

Ingram Micro signs distribution agreement with CrowdStrike

15-Jul-2021 | CRN

Article icon

Biden To Putin: ‘Take Action To Disrupt Ransomware Groups’

13-Jul-2021 | Inside Cybersecurity

Article icon

NIST, NTIA begin EO-directed exploration of how to secure software used by federal agencies

9-Jul-2021 | Federal News Network

Article icon

The concept of “threat hunting”

9-Jul-2021 | Yahoo Finance

Article icon

Ransomware has surged — Why the attacks are ‘going crazy right now’

8-Jul-2021 | Which-50

Article icon

REvil Ransomware Attack; Cyber Experts Respond

8-Jul-2021 | Security Ledger

Article icon

Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT

7-Jul-2021 | FutureCIO

Article icon

FutureCISO Security Alert: $70 million to stop the attack on Kaseya

6-Jul-2021 | Security Brief

Article icon

CrowdStrike picks up AWS award for Falcon cybersecurity solution

6-Jul-2021 | Tech Register

Article icon

Kaseya ransomware hack has global impact

6-Jul-2021 | Miami Herald

Article icon

One of Miami’s oldest tech firms is at the center of a global ransomware computer hack

6-Jul-2021 | Dark Reading

Article icon

Cyberattack on Kaseya Nets More Than 1,000 Victims, $70M Ransom Demand

5-Jul-2021 | Startup Daily

Article icon

A suspected Russian hack on a US software company has caused a mass ransomware disaster

5-Jul-2021 | Forbes

Article icon

$70 Million Demanded As REvil Ransomware Attackers Claim 1 Million Systems Hit

5-Jul-2021 | Information Age

Article icon

Tech vendor attack causes mass ransomware event [ia.acs.org.au]

5-Jul-2021 | Australian Financial Review

Article icon

Cyber agency confirms Australian firms hit by supply chain attack

5-Jul-2021 | TechCrunch

Article icon

Kaseya hack floods hundreds of companies with ransomware

3-Jul-2021 | CRN

Article icon

Kaseya VSA Ransomware Attack Hits Nearly 40 MSPs

3-Jul-2021 | Reuters

Article icon

UPDATE 2-Major ransomware attack against U.S. tech provider forces Swedish store closures

2-Jul-2021 | Channel Comms Today

Article icon

10 minutes with: Amanda Adams, Senior Director, European Alliances at CrowdStrike

1-Jul-2021 | Microscope

Article icon

July 2021: Life on the edge

30-Jun-2021 | Toolbox Tech

Article icon

CrowdStrike SVP On the Unrealized Potential of Threat Hunting Among Organizations

30-Jun-2021 | SiliconANGLE

Article icon

Arizona State, CrowdStrike partner for improved cybersecurity, stringent compliance requirements

29-Jun-2021 | ZDNet

Article icon

New ransomware highlights widespread adoption of Golang language by cyberattackers

29-Jun-2021 | Security Brief

Article icon

CrowdStrike takes out number one spot in IDC report

28-Jun-2021 | Solutions Review

Article icon

Solutions Review’s Vendors to Know in Endpoint Security Platforms, 2021

25-Jun-2021 | CRN

Article icon

The 10 Hottest New Cybersecurity Tools And Products Of 2021 (So Far)

25-Jun-2021 | San Francisco Business Times / Silicon Valley Business Journal

Article icon

"We’re Not a One Trick Pony”

24-Jun-2021 | Business World

Article icon

Why Indian Startups Need A Revamped Cybersecurity Game Plan?

24-Jun-2021 | France24

Article icon

Cybercrime busters: How should companies deal with rise in ransomware attacks?

24-Jun-2021 | The Verge

Article icon

Ransom Notes

23-Jun-2021 | Solutions Review

Article icon

Solutions Review’s Vendors to Know in EDR Platforms, 2021

22-Jun-2021 | Computing

Article icon

Cybersecurity Festival Day One: We are too fast to say we don't trust

17-Jun-2021 | Protocol

Article icon

Braintrust: In the immediate aftermath of a ransomware attack, what's the biggest mistake a company can make?

17-Jun-2021 | NPR

Article icon

Biden Tells Putin To Crackdown On Ransomware. What Are The Odds He Will?

17-Jun-2021 | TechTarget

Article icon

SolarWinds response team recounts early days of attack

16-Jun-2021 | TechRadar Pro

Article icon

The evolving ransomware threat

15-Jun-2021 | Enterprise Channels MEA

Article icon

eCrime is fastest growing threat for Middle East

15-Jun-2021 | The Markup

Article icon

Why Is Ransomware on the Rise?

15-Jun-2021 | Digital.com

Article icon

The Best EDR Software of 2021

15-Jun-2021 | Dataquest

Article icon

Safeguard your workforce from phishing campaigns while managing return to offices

15-Jun-2021 | Newsweek

Article icon

Why Vladimir Putin Wants A Deal to Prevent 'Cyber Pearl Harbor' From Pulling Joe Biden Into War

14-Jun-2021 | ITWeb

Article icon

Protecting an expanding attack surface

14-Jun-2021 | HelpNetSecurity

Article icon

Ransomware attackers are leveraging old SonicWall SRA flaw (CVE-2019-7481)

11-Jun-2021 | FedTech

Article icon

Coast Guard to Stand Up First Cybersecurity ‘Red Team’

11-Jun-2021 | Security Middle East

Article icon

NDR, EDR and XDR – More Than Just Buzzwords?

10-Jun-2021 | Security Magazine

Article icon

Zero Trust, a core component of any modern security strategy

8-Jun-2021 | Barron's

Article icon

Ransomware Boom Comes From Groups Operating Like Cloud-Software Unicorns

5-Jun-2021 | POLITICO

Article icon

Cyberattack on food supply followed years of warnings

5-Jun-2021 | Business Insider

Article icon

The CEO of $47 billion cybersecurity giant CrowdStrike says that the company's monster quarter is a sign that the industry is ready to move beyond legacy vendors like Microsoft

4-Jun-2021 | NPR

Article icon

As Cyber Attacks Surge, Biden Seeks To Mount A Better Defense

3-Jun-2021 | Associated Press

Article icon

Largest meat producer getting back online after cyberattack

2-Jun-2021 | Wall Street Journal

Article icon

Ransomware Scourge Continues as Essential Services Are Hit

1-Jun-2021 | TechTarget

Article icon

Hackers vs. lawyers: Security research stifled in key situations

1-Jun-2021 | Sportscar365

Article icon

How CrowdStrike Protects SRO America

1-Jun-2021 | Information Age

Article icon

Major meat processor hit by cyber attack

1-Jun-2021 | FCW

Article icon

Creating a more resilient American infrastructure

29-May-2021 | TechTarget

Article icon

CrowdStrike breaks down 'Golden SAML' attack

29-May-2021 | Business Chief

Article icon

CrowdStrike, EY take on ransomware with cyber partnership

28-May-2021 | MSNBC

Article icon

Fmr. Exec. Asst. FBI Director: The U.S. ‘needs to put deterrence measures in place’ against cyberattacks

28-May-2021 | Security Brief

Article icon

CrowdStrike announces new integrations as enterprises struggle to secure operations

28-May-2021 | Security Brief

Article icon

CrowdStrike and EY extend partnership to put a stop to ransomware

26-May-2021 | Borneo Bulletin

Article icon

Rising cyberattacks in West highlight vulnerabilities

26-May-2021 | IT Security Guru

Article icon

Almost half of British organisations aren’t reporting data breaches, CrowdStrike finds

26-May-2021 | Defence Connect

Article icon

CrowdStrike and EY expand global cyber partnership

26-May-2021 | Fast Company

Article icon

Why the Colonial Pipeline ransomware attack is a sign of things to come

25-May-2021 | Bdaily

Article icon

GDPR three years on: How businesses can continue navigating data and privacy

25-May-2021 | IT Pro Portal

Article icon

Nearly half of firms aren't reporting data breaches

25-May-2021 | Infosecurity Magazine

Article icon

Only Two-Fifths of UK Firms Report Data Breaches On Time

25-May-2021 | Cybersecurity ASEAN

Article icon

CrowdStrike and EY Announce Expansion of Alliance to Provide Joint Cyber Offerings to Help Combat Ransomware and Accelerate Zero Trust

25-May-2021 | Which-50

Article icon

Ireland’s Health Service Hit By Country’s Most Significant Ransomware Attack Yet

25-May-2021 | Channel Partner Insight

Article icon

CrowdStrike teams up with Ernst & Young to combat ransomware

25-May-2021 | Computing

Article icon

CNA Financial paid $40 million to hackers

25-May-2021 | HelpNetSecurity

Article icon

CrowdStrike and EY expand alliance to help businesses grow their resiliency and security posture

25-May-2021 | Yahoo Finance

Article icon

World's leading bank robbers': North Korea's hacker army

25-May-2021 | CNN

Article icon

DHS to mandate pipeline companies report cybersecurity breaches

24-May-2021 | SDxCentral

Article icon

CrowdStrike, EY Take On Ransomware, Zero Trust

24-May-2021 | SC Media

Article icon

EY and CrowdStrike partner to deliver cloud-based security services

24-May-2021 | SDxCentral

Article icon

Daily Round Up: CrowdStrike, EY Wage War on Ransomware

24-May-2021 | CSO

Article icon

The 10 most dangerous cyber threat actors

21-May-2021 | Datamation

Article icon

Best Threat Intelligence Platforms for 2021

21-May-2021 | SecurityWeek

Article icon

RSA Conference 2021 - Summary of Vendor Announcements

20-May-2021 | Security Brief

Article icon

CrowdStrike launches industry-first adversary-focused cloud security solution

20-May-2021 | CRN

Article icon

12 Lessons Learned From The SolarWinds Breach: RSA Conference

20-May-2021 | CRN

Article icon

The 15 Hottest Cybersecurity Products At RSA Conference 2021

19-May-2021 | WTOP

Article icon

During pandemic, DC was 2nd-most targeted area by cybercrime

19-May-2021 | Cybersecurity Magazine

Article icon

New features CrowdStrike’s Falcon Horizon

19-May-2021 | CRN

Article icon

The 7 Hottest Cloud Security Products At RSA Conference

18-May-2021 | CRN

Article icon

6 Cool New Zero Trust Security Tools At RSA Conference 2021

18-May-2021 | HelpNetSecurity

Article icon

CrowdStrike Falcon® Fusion improves IT efficiency and agility

18-May-2021 | SDxCentral

Article icon

Microsoft, CrowdStrike Lead Gartner’s Power-Packed EPP Quad

18-May-2021 | ZDNet

Article icon

Google beefs up Workspace security with these new features

18-May-2021 | CRN

Article icon

6 Cool New Zero Trust Security Tools At RSA Conference 2021

17-May-2021 | Security Boulevard

Article icon

CrowdStrike Deepens Security Ties with Google

17-May-2021 | Pharmaphorum

Article icon

Double ransomware attack targets Irish healthcare system

17-May-2021 | Washington Business Journal

Article icon

Biden’s cybersecurity executive order offers risks, rewards for contractors

17-May-2021 | information Age

Article icon

US oil supplier paid $4.4 million ransom

17-May-2021 | Bloomberg

Article icon

ANALYSIS: Cloud Adoption Is Key to Silicon Valley Security Boom

15-May-2021 | The Times

Article icon

HSE cyber attack: Ageing tech was vulnerable to hackers

13-May-2021 | Cybersecurity Connect

Article icon

Op-Ed: Closing the ‘cloud visibility gap’

13-May-2021 | Business Insider

Article icon

Biden's big cybersecurity executive order will be a windfall for both massive firms like CrowdStrike and niche startups like Dragos, experts say

13-May-2021 | Meritalk

Article icon

Tech Sector Likes Cyber Order’s Enterprise-Wide View, Cloud Push

12-May-2021 | Bloomberg

Article icon

DarkSide Hackers Mint Money With Ransomware Franchise

11-May-2021 | HelpNetSecurity

Article icon

CrowdStrike and Google Cloud deliver defense-in-depth security across hybrid cloud environments

11-May-2021 | Security Brief

Article icon

CrowdStrike and Google Cloud announce product integrations to boost security

10-May-2021 | Investors Observer

Article icon

Crowdstrike (CRWD) and Google Cloud to Integrate Products

10-May-2021 | MSSP Alert

Article icon

CrowdStrike, Google Chronicle Confirm Cloud Security Integrations

10-May-2021 | SC Media

Article icon

CrowdStrike, Google partnership aims to deliver defense-in-depth for hybrid cloud environments

10-May-2021 | SDxCentral

Article icon

Is Google Cloud’s CrowdStrike Security Deal XDR?

10-May-2021 | SDxCentral

Article icon

Daily Roundup: Google Cloud, CrowdStrike Boost Security

10-May-2021 | SiliconANGLE

Article icon

Google and CrowdStrike team up for more efficient hacker detection in the cloud

10-May-2021 | VMBlog

Article icon

CrowdStrike and Google Cloud Extend Strategic Partnership to Deliver Defense-in-Depth Protection Across Hybrid Cloud Environments

10-May-2021 | Channel Partner Insight

Article icon

CrowdStrike 'doubles down' on European MSP expansion drive

10-May-2021 | CRN

Article icon

Google Cloud And CrowdStrike Deepen Security Integrations

10-May-2021 | WIRED

Article icon

DarkSide Ransomware Hit Colonial Pipeline—and Created an Unholy Mess

6-May-2021 | CIO

Article icon

Healthcare CIOs fear (and fend off) ransomware threats amid pandemic

4-May-2021 | Investor Daily

Article icon

Keeping the pandas, kittens and spiders out of the financial services industry: A hot target for cyber criminals and nation-states in 2021

4-May-2021 | Forbes

Article icon

Why Security Matters More Than Ever For Small Businesses

3-May-2021 | SC Media

Article icon

Keeping up: How the threat landscape drove demand for and development of new capabilities

3-May-2021 | SC Media

Article icon

Security Executive of the Year | Shawn Henry, CrowdStrike

3-May-2021 | SC Media

Article icon

Best Cloud Computing Security Solution | CrowdStrike Falcon® Platform

3-May-2021 | SC Media

Article icon

Best Managed Security Service | CrowdStrike Falcon® Complete

3-May-2021 | Forbes

Article icon

Four Ways To Harness The Power Of Customer Value To Jumpstart Recovery

2-May-2021 | Business Insider

Article icon

The reopening of offices and the rush to hybrid work is already creating a nightmare scenario, and many companies aren't ready

29-Apr-2021 | Security Brief

Article icon

CrowdStrike launches integrations to advance NDR for enterprise

26-Apr-2021 | Security Solutions

Article icon

CrowdStrike Security Cloud Integrates with Network Detection and Response Solutions For Comprehensive Platform Responses to Threats

26-Apr-2021 | HelpNetSecurity

Article icon

CrowdStrike Security Cloud integrates with NDR and NTA solutions to defend against any threats

25-Apr-2021 | The Australian

Article icon

To protect Australia’s vaccine program, we need to fend off the Spiders and Pandas

23-Apr-2021 | eSecurity Planet

Article icon

Top Cybersecurity Products for 2021

22-Apr-2021 | Security Boulevard

Article icon

Better detection from endpoint to network: IronNet partners with CrowdStrike

22-Apr-2021 | Security Boulevard

Article icon

CrowdStrike + Corelight partner to reach new heights

22-Apr-2021 | Australian Financial Review

Article icon

Scammer’s paradise: why you should change your online habits

20-Apr-2021 | TechTarget

Article icon

The wide web of nation-state hackers attacking the US

16-Apr-2021 | NPR’s All Things Considered

Article icon

A 'Worst Nightmare' Cyberattack: The Untold Story Of The SolarWinds Hack

16-Apr-2021 | Information Age

Article icon

The next wave of cyber adversaries, and how to protect against them

15-Apr-2021 | Channel Partner Insight

Article icon

WATCH: CPI's Vendor CEO Montage Episode 2 - 'What habit do your employees best know you for?'

14-Apr-2021 | Dark Reading

Article icon

Bolstering Our Nation's Defenses Against Cybersecurity Attacks

12-Apr-2021 | MSSP Alert

Article icon

Saas Security Startup DoControl Raises $10M from VCs, CrowdStrike

12-Apr-2021 | New York Business Journal

Article icon

Data monitoring company DoControl raises $10 million

12-Apr-2021 | Fortune

Article icon

30 Best Large Workplaces in Technology

9-Apr-2021 | MSSP Alert

Article icon

CrowdStrike Invests in No-Code Security Automation Startup Tines

8-Apr-2021 | Protocol

Article icon

The Department of Homeland Security is launching 60-day cybersecurity sprints. What advice would you give to a team leading one?

5-Apr-2021 | Channel Partner Insight

Article icon

WATCH: CPI's Vendor CEO Montage - 'What's the best thing about your job? And the worst?'

2-Apr-2021 | SDxCentral

Article icon

SDxCentral 2-Minute Weekly Wrap: Cisco Jumps Into NaaS Arena

2-Apr-2021 | Automation World

Article icon

Industrial Cybersecurity Concerns Heat Up in The Era of COVID-19

31-Mar-2021 | SecurityBrief Asia

Article icon

Zscaler and CrowdStrike release integrations for end-to-end security

31-Mar-2021 | Cybersecurity Connect

Article icon

Zscaler, CrowdStrike broaden integration capabilities

30-Mar-2021 | StateScoop

Article icon

Oklahoma CISO says pandemic accelerated zero-trust implementation

30-Mar-2021 | MSSP Alert

Article icon

Zscaler, CrowdStrike Announces Zero Trust Security Integrations

30-Mar-2021 | Sportscar365

Article icon

CrowdStrike, SRO Partnership Provides ‘Immediate Connection’

29-Mar-2021 | SDxCentral

Article icon

Zscaler, CrowdStrike Team Up on Zero-Trust Security

29-Mar-2021 | IT Pro

Article icon

Zscaler teams with CrowdStrike for remote access security

29-Mar-2021 | Finalists: Best Security Company

Article icon

Finalists: Best Security Company

29-Mar-2021 | SC Media

Article icon

Finalists: Best Enterprise Security Solution

29-Mar-2021 | SC Media

Article icon

Finalists: Best Cloud Computing Security Solution

29-Mar-2021 | SC Media

Article icon

Finalists: Best Managed Security Service

29-Mar-2021 | SC Media

Article icon

Finalists: Security Executive of the Year

28-Mar-2021 | FutureCIO

Article icon

Expect more ransomware in 2021

26-Mar-2021 | Tech Wire Asia

Article icon

Study: Half of organizations suffered a ransomware attack in 2020

24-Mar-2021 | Intelligent CIO APAC

Article icon

Get to know: Sherif El Nabawi of CrowdStrike

22-Mar-2021 | Fear & Greed

Article icon

Interview: CrowdStrike's Michael Sentonas on global cyber threats

22-Mar-2021 | IT Europa

Article icon

Westcon security priority is built on CrowdStrike

17-Mar-2021 | MSSP Alert

Article icon

CrowdStrike CEO Touts AWS Cloud Marketplace and EY Partnerships

16-Mar-2021 | Intelligent CISO

Article icon

Editor’s Question: How can the channel help SMEs?

15-Mar-2021 | CSO

Article icon

Australia government says ransomware is for businesses to address

11-Mar-2021 | Newsweek

Article icon

After SolarWinds, Companies Turn to Insurers, Not Feds, for Protection

11-Mar-2021 | SDxCentral

Article icon

CrowdStrike, Trend Micro Face Off on XDR

11-Mar-2021 | Cybersecurity Connect

Article icon

CrowdStrike bolsters Falcon platform

11-Mar-2021 | Digitalisation World

Article icon

Back to the future?

9-Mar-2021 | Information Age

Article icon

Cybercrooks upped their game in 2020

9-Mar-2021 | The Parallax

Article icon

Cyberattacks cost health care millions, but reform remains elusive

9-Mar-2021 | Security Brief

Article icon

IWD 2021: CrowdStrike director on championing women in the workplace

8-Mar-2021 | IT Pro Portal

Article icon

How to reap the benefits of going cloud-native without compromising cybersecurity

8-Mar-2021 | Dataquest

Article icon

How Easy or Difficult is it for Women in IT to Reach the Top?

8-Mar-2021 | Healthcare Business News

Article icon

Data extortion ransomware attacks on healthcare sector up 580% during COVID-19

8-Mar-2021 | Automotive World

Article icon

Daimler: New paintwork in bright red further enhances visibility

6-Mar-2021 | TechHerald

Article icon

CrowdStrike completes the $400 million Humio acquisition

5-Mar-2021 | HelpNetSecurity

Article icon

CrowdStrike Falcon® platform enhancements improve SOC efficiency

5-Mar-2021 | MSSP Alert

Article icon

CrowdStrike Falcon® Enhances SOC Security Workflow Automation

5-Mar-2021 | Healthcare IT News

Article icon

Data extortion attempts signal new era for ransomware tactics

4-Mar-2021 | SecurityBrief Asia

Article icon

CSO Group scores AU$16m deal with NSW Government

3-Mar-2021 | ARN

Article icon

CrowdStrike celebrates Aussie partners at A/NZ awards

3-Mar-2021 | CRN Australia

Article icon

CrowdStrike cheers top ANZ partners

3-Mar-2021 | SecurityBrief Asia

Article icon

Cybercriminals take bold steps forward as confidence soars - CrowdStrike report

3-Mar-2021 | Cybersecurity Connect

Article icon

CSO Group announced a deal on Tuesday with the NSW Department of Communities and Justice to improve the department’s cyber security capabilities.

3-Mar-2021 | Govtech Review

Article icon

Report: e-crime actors drove cyber intrusions in 2020

3-Mar-2021 | SecurityBrief

Article icon

Cybercriminals take bold steps forward as confidence soars - CrowdStrike report

3-Mar-2021 | Technology Decisions

Article icon

Report: e-crime actors drove cyber intrusions in 2020

2-Mar-2021 | Campus Review

Article icon

Why Australia’s education sector is proving an attractive target for cybercriminals

2-Mar-2021 | Govtech Review

Article icon

E-crime attacks 79% of hand-on intrusions in 2020: report

26-Feb-2021 | CyberScoop

Article icon

Ransomware hackers turn to virtual machine software to boost extortion schemes

25-Feb-2021 | SC Media

Article icon

Old foe or new enemy? Here’s how researchers handle APT attribution

25-Feb-2021 | ZDNet

Article icon

This chart shows the connections between cybercrime groups

25-Feb-2021 | Security Solutions

Article icon

CrowdStrike Global Threat Report Highlights Key Trends in eCrime and Nation-State Activity

25-Feb-2021 | Intelligent CISO

Article icon

CrowdStrike delivers advanced threat protection for cloud and container workloads

25-Feb-2021 | ABC 8 KLKN

Article icon

Cybercrime has skyrocketed since working remote, studies say

25-Feb-2021 | Poynter

Article icon

Covering COVID-19: A Daily Coronavirus Briefing for Journalists

25-Feb-2021 | Cybersec Asia

Article icon

Big game hunting, ransomware dominate cybercrime ecosystem

25-Feb-2021 | HelpNetSecurity

Article icon

CrowdStrike boosts control, visibility and security for cloud workloads and cloud-native apps

22-Feb-2021 | Intelligent CIO EU

Article icon

How BT drives security from a necessity to a beacon of business responsibility

30-Nov-2020 | Stockhead

Article icon

Cybersecurity outlook: Here’s why 2021 will be an even bigger year for the sector

29-Nov-2020 | Business Insider

Article icon

Meet the 50 CEOs, investors, and hackers who helped lead the cybersecurity industry through an unprecedented and tumultuous year

25-Nov-2020 | PC World

Article icon

Six tips to shop safely on Black Friday

25-Nov-2020 | Cybersecurity Dive

Article icon

Sharp rise in IT spending as cyberthreats evolve, Crowdstrike finds

23-Nov-2020 | MyTechDecisions.com

Article icon

CrowdStrike: Ransomware, Nation-State Attacks Dominate Security Threats

23-Nov-2020 | Intelligent CIO APAC

Article icon

CrowdStrike report reveals Australian organizations suffer more ransomware attacks than the rest of the world

21-Nov-2020 | The Logical Indian

Article icon

Ransomware Attacks On Rise, Companies Invest In Strengthening Security: Survey

20-Nov-2020 | SecurityBrief

Article icon

Rate of ransomware attacks in Australia well above global average — report

20-Nov-2020 | CybersecAsia

Article icon

APAC hardest hit by ransomware to the tune of US$1.18m

20-Nov-2020 | Business Standard

Article icon

India Coronavirus Dispatch: Patent battles can choke Covid drugs pipeline

20-Nov-2020 | The Hindu Business Line

Article icon

State-sponsored cyberattacks one of the biggest threats in 2021: Report

20-Nov-2020 | HelpNetSecurity

Article icon

56% of organizations faced a ransomware attack, many paid the ransom

19-Nov-2020 | Singapore Business Review

Article icon

28% of ransomware-hit Singapore firms paid a ransom: study

19-Nov-2020 | MSN Singapore

Article icon

28% of ransomware-hit Singapore firms paid a ransom: study

19-Nov-2020 | Express Computer

Article icon

India worst hit by ransomware in APAC region: Survey

19-Nov-2020 | Inc42

Article icon

Indian Companies Paid Upto $2.5 Mn To Get Back Data From Hackers: Report

19-Nov-2020 | Times of India

Article icon

India is second in global ransom payouts for cyberattacks: Survey

19-Nov-2020 | The Indian Express

Article icon

COVID-19 impact: Ransomware attacks increase worldwide, shows CrowdStrike survey

19-Nov-2020 | CRN India

Article icon

India worst hit by ransomware in APAC region: Survey

19-Nov-2020 | SDxCentral

Article icon

Amazon Adds Network Firewall to AWS Security Tool Chest

19-Nov-2020 | TechTarget

Article icon

White House questions election security; experts do not

18-Nov-2020 | CIO&Leader

Article icon

Fear Of State-Sponsored And Ransomware Attacks Pose Danger Of Stifling Future Business Growth In Post-COVID Era: Survey

18-Nov-2020 | CISO Magazine

Article icon

Ransomware Attacks Continue to Impact Digital and Security Transformation

18-Nov-2020 | TechRadar India

Article icon

India worst hit by ransomware in Asia Pacific region

18-Nov-2020 | Dataquest

Article icon

Fear of state-sponsored and ransomware attacks pose danger of stifling future business growth: CrowdStrike global survey

18-Nov-2020 | Business Insider India

Article icon

Indian businesses hit by more ransomware attacks than Australia, Japan and Singapore reveals new survey

18-Nov-2020 | Mint

Article icon

Cyberattacks from China concern for Indian firms in post-covid world

18-Nov-2020 | ETCIO.com

Article icon

Fear of State-Sponsored, Ransomware Attacks Pose Danger of Stifling Future Business Growth: Global Survey

18-Nov-2020 | Australian Financial Review

Article icon

Ransomware becomes a million-dollar menace for Aussie firms

18-Nov-2020 | Computing

Article icon

UK firms are paying some of the highest ransoms globally

18-Nov-2020 | ZDNet

Article icon

Why ransomware is still so successful: Over a quarter of victims pay the ransom

18-Nov-2020 | HelpNetSecurity

Article icon

AWS Network Firewall: Network protection across all AWS workloads

18-Nov-2020 | Security Week

Article icon

AWS Network Firewall Now Generally Available

17-Nov-2020 | CyberWire

Article icon

Hidden Cobra strikes supply chain. Malsmoke goes all-in for social engineering. Ransomware notes. EU data privacy regs.

17-Nov-2020 | Computer Weekly

Article icon

Ransomware stats overload risks confusing buyers

17-Nov-2020 | Infosecurity Magazine

Article icon

UK Firms Least Likely to Pay Ransom Globally

17-Nov-2020 | TechTarget

Article icon

CrowdStrike: Ransomware hit 56% of organizations in last year

8-Nov-2020 | Digitalisation World

Article icon

Why you should self-isolate, but your IT infrastructure should not

4-Nov-2020 | HelpNetSecurity

Article icon

Malwarebytes Remediation solutions now available to CrowdStrike’s Fortune 1000 customers

3-Nov-2020 | SecurityBrief

Article icon

Mimecast and CrowdStrike partnership protects customers from advanced attacks

2-Nov-2020 | SC Media

Article icon

Maze operators claim they are shutting down

29-Oct-2020 | Business Insider

Article icon

Hospitals across the US have been hit by a wave of ransomware attacks, disrupting their computer systems and forcing them to turn away ambulances

26-Oct-2020 | WIRED

Article icon

The Russian Hackers Playing 'Chekhov's Gun' With US Infrastructure

23-Oct-2020 | Cyber Risk Leaders

Article icon

New module, CrowdStrike Falcon® Intelligence Recon for 2021 release

22-Oct-2020 | Digital.com

Article icon

The Best Antivirus Software of 2020

20-Oct-2020 | Bank Info Security

Article icon

Trickbot Rebounds After 'Takedown'

20-Oct-2020 | TechTarget

Article icon

After a brief pause, Trickbot rebounds from takedown efforts

20-Oct-2020 | Dark Reading

Article icon

Trickbot Tenacity Shows Infrastructure Resistant to Takedowns

20-Oct-2020 | Computer Weekly

Article icon

Resilient Trickbot down but not yet knocked out

19-Oct-2020 | POLITICO

Article icon

Morning Cybersecurity: Mark Warner keeps his head down

19-Oct-2020 | InfoRiskToday

Article icon

Building an Effective Ransomware Mitigation Strategy

19-Oct-2020 | CyberWire

Article icon

Updates on campaign hacking and influence operations. TrickBot's recovery. Schools remain attractive targets.

16-Oct-2020 | SDxCentral

Article icon

U.S. Intelligence Chief Pushes ‘Intelligence Sharing on Steroids’

16-Oct-2020 | Dark Reading

Article icon

US Counterintelligence Director & Fmr. Europol Leader Talk Election Security

16-Oct-2020 | Infosecurity Magazine

Article icon

Election Security and Confidence Can Be Enabled Through Public-Private Partnerships

15-Oct-2020 | SecurityBrief

Article icon

CrowdStrike targets Zero Trust blind spot with new offering

15-Oct-2020 | MSSP Alert

Article icon

CrowdStrike Fal.Con 2020: 5 Announcements MSSPs Need to Know About

15-Oct-2020 | ARN

Article icon

One on One with ARN: CrowdStrike’s Brett Raphael

15-Oct-2020 | Bloomberg

Article icon

U.S. Intelligence Official Says Social Media ‘Big Vulnerability’

14-Oct-2020 | Security Boulevard

Article icon

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

14-Oct-2020 | CyberWire

Article icon

IBM will spin off IT infrastructure business. Unqork closes $207 million Series C round. Cellebrite ceases business in China and Hong Kong, citing US restrictions.

14-Oct-2020 | SDxCentral

Article icon

CrowdStrike Falcon® Hunts Security Threats, Cloud Misconfigs

13-Oct-2020 | FedTech

Article icon

Cross-Site Scripting Attacks: How to Prevent XSS Vulnerabilities

6-Oct-2020 | American Banker

Article icon

5 ransomware trends that should alarm banks

5-Oct-2020 | Intelligent CIO APAC

Article icon

Why cybercrime remains a worrying business challenge in a COVID-lockdown world

2-Oct-2020 | TechTarget

Article icon

Potential ransomware-related death still under investigation

2-Oct-2020 | Federal News Network

Article icon

Election security: Thwarting disinformation and interference in 2020

29-Sep-2020 | SecurityBrief

Article icon

CrowdStrike acquires Preempt Security for $96m, develops zero trust security offerings

29-Sep-2020 | Lawyers Weekly

Article icon

How legal firms can stay on the front foot of digital transformation

28-Sep-2020 | Enterprise Times

Article icon

CrowdStrike strengthens its zero trust capabilities with acquisition

25-Sep-2020 | Drives & Control Magazine

Article icon

Cyber-attacks on manufacturers rise ‘dramatically’

25-Sep-2020 | Solutions Review

Article icon

CrowdStrike Announces Plan to Acquire Preempt Security

25-Sep-2020 | HelpNetSecurity

Article icon

CrowdStrike acquires Preempt to provide zero trust security architecture and threat protection

25-Sep-2020 | StateScoop

Article icon

Baltimore ransomware attack was early attempt at data extortion, new report shows

24-Sep-2020 | GeekTime

Article icon

Crowdstrike boosts authentication powers by acquiring Preempt for $96M

24-Sep-2020 | CTech

Article icon

Israeli-American cyber company Preempt Security to be acquired by CrowdStrike in $96 million deal

24-Sep-2020 | Telecompaper

Article icon

CrowdStrike to acquire Preempt Security to offer 'zero trust' security

24-Sep-2020 | MSSP Alert

Article icon

Managed Security Service Provider (MSSP) News: 24 September 2020

24-Sep-2020 | San Francisco Business Times

Article icon

CrowdStrike to snap up S.F. cybersecurity startup Preempt Security for $96 million

24-Sep-2020 | CRN

Article icon

Dramatic rise in eCrime activity and shift in industries targeted during pandemic: CrowdStrike report

24-Sep-2020 | CRN

Article icon

CrowdStrike splashes $96m on US security startup

24-Sep-2020 | Dark Reading

Article icon

CrowdStrike Agrees to Acquire Preempt Security for $96M

24-Sep-2020 | Channel Partner Insight

Article icon

CrowdStrike ramps up Zero Trust offering with $96m Preempt Security acquisition

24-Sep-2020 | Business Insider

Article icon

100 customers told Crowdstrike's CEO they want more 'zero trust' security, so he made a $96 million acquisition of startup Preempt to double down on cybersecurity's hottest trend

24-Sep-2020 | Fortune

Article icon

“A.I. is a living and breathing engine”

23-Sep-2020 | Seeking Alpha

Article icon

CrowdStrike acquires identity security company Preempt Security for $96M

23-Sep-2020 | Intelligent CIO

Article icon

New CrowdStrike Threat Hunting Report reveals dramatic rise in e-crime activity

23-Sep-2020 | ZDNet

Article icon

CrowdStrike to acquire Preempt Security for $96 million

23-Sep-2020 | SiliconAngle

Article icon

CrowdStrike acquires zero-trust cybersecurity startup Preempt Security for $96M

23-Sep-2020 | Security Week

Article icon

CrowdStrike Pushes Zero Trust With $96 Million Acquisition of Preempt Security

23-Sep-2020 | MarketWatch

Article icon

CrowdStrike to acquire Preempt Security for $96 million

23-Sep-2020 | CRN

Article icon

CrowdStrike To Buy Identity Startup Preempt Security For $96M

22-Sep-2020 | IT Reseller

Article icon

New CrowdStrike Report reveals more cyber-attacks in the first half of 2020 than the whole of 2019

22-Sep-2020 | InfoRiskToday

Article icon

Cybercrime Review: Hackers Cash in on COVID-19

22-Sep-2020 | SecurityBrief

Article icon

Video: 10 Minute IT Jams - Who is CrowdStrike?

21-Sep-2020 | SC Media

Article icon

Amid Iranian hacker crackdown, CISOs should prep for retaliation

21-Sep-2020 | SC Media

Article icon

Critical Zerologon bug uses weak cryptography to spoof network users

18-Sep-2020 | Frontier Enterprise

Article icon

Intruders rev up attacks, shift aim to manufacturing during pandemic

17-Sep-2020 | Cybersec Asia

Article icon

Massive surge in cyberthreats in H1 2020 foreshadow worse threats to come

17-Sep-2020 | CISO Magazine

Article icon

eCrime Activities and Hands-on Keyboard Intrusions Rise in H1 2020

17-Sep-2020 | Intelligent CISO

Article icon

New CrowdStrike report reveals more cyberattacks in the first half of 2020 than 2019

17-Sep-2020 | Computer Weekly

Article icon

Coronavirus puts security at the heart of the agenda

16-Sep-2020 | Inquirer.net

Article icon

Business leaders now see cyberthreats as top concern

16-Sep-2020 | VAR India

Article icon

CrowdStrike announces Threat Hunting Report, reveals rise in eCrime Activity

16-Sep-2020 | The Hindu Business Line

Article icon

Cyber crime activity on the rise this year, warn experts

16-Sep-2020 | AuManufacturing

Article icon

2020 Sees Spike in Cyberattacks for Manufacturers

16-Sep-2020 | Information Age

Article icon

Cyber attacks boom in 2020

16-Sep-2020 | Digitalisation World

Article icon

Dramatic rise in e-crime activity

16-Sep-2020 | Seeking Alpha

Article icon

CrowdStrike and Dynatrace join ServiceNow Service Graph Connector Program

16-Sep-2020 | HelpNetSecurity

Article icon

eCrime campaigns outpace state-sponsored activity in first half of 2020

16-Sep-2020 | Australian Financial Review

Article icon

The Australian industries most targeted by hackers

16-Sep-2020 | Bank Info Security

Article icon

Iranian Hackers Exploiting Unpatched Vulnerabilities

16-Sep-2020 | Newsweek

Article icon

U.S., China's Cold War Is Raging in Cyberspace, Where Intellectual Property Is A Costly Front

15-Sep-2020 | ZDNet

Article icon

Hackers are getting more hands-on with their attacks. That's not a good sign

15-Sep-2020 | Dark Reading

Article icon

More Cyberattacks in the First Half of 2020 Than in All of 2019

15-Sep-2020 | CyberScoop

Article icon

Chinese hacking groups are bullying telecoms as 2020 goes on, CrowdStrike says

15-Sep-2020 | CQ Roll Call

Article icon

Report: Hackers aimed at manufacturing firms during pandemic

10-Sep-2020 | HelpNetSecurity

Article icon

CrowdStrike enhances services for AWS

4-Sep-2020 | Solutions Review

Article icon

Solutions Review Releases Mid-2020 Buyer’s Guide: Endpoint Security

1-Sep-2020 | Infosecurity Magazine

Article icon

Iranian Hackers Advertise on Dark Web

1-Sep-2020 | Threatpost

Article icon

Pioneer Kitten APT Sells Corporate Network Access

1-Sep-2020 | ZDNet

Article icon

Iranian hackers are selling access to compromised companies on an underground forum

1-Sep-2020 | Bleeping Computer

Article icon

Iranian hackers are selling access to corporate networks

1-Sep-2020 | CyberWire

Article icon

DDoS against NZX continues. Pioneer Kitten's revenue diversification. Mac notarization failure. Gaming's black market.

1-Sep-2020 | Dark Reading

Article icon

New APT Pioneer Kitten Linked to Iranian Government

29-Aug-2020 | 9News

Article icon

Cybercrime up 330 per cent as working from home creates 'perfect environment' for scammers

28-Aug-2020 | Intelligent CIO

Article icon

Help AG partners with CrowdStrike to advance endpoint protection and incident response

27-Aug-2020 | ITWeb

Article icon

Survival of the fastest

25-Aug-2020 | ITWeb

Article icon

Traditional security products can’t deal with modern attacks

24-Aug-2020 | SecurityBrief

Article icon

CrowdStrike adds three new solutions to digital store

22-Aug-2020 | Business Times

Article icon

Driven to win

21-Aug-2020 | Business Times

Article icon

Performance appraisal in a pandemic

20-Aug-2020 | Intelligent CIO APAC

Article icon

Why cybercrime remains a worrying business challenge in a COVID-lockdown world

20-Aug-2020 | CyberScoop

Article icon

FBI, DHS expose North Korean government malware used in fake job posting campaign

20-Aug-2020 | Washington Examiner

Article icon

Lawmakers want cyberprotection for university COVID-19 research

19-Aug-2020 | SC Media

Article icon

U.S. urges Linux users to secure kernels from new Russian malware threat

18-Aug-2020 | MSSP Alert

Article icon

Managed Security Service Provider (MSSP) News: 18 August 2020

17-Aug-2020 | Insurance News

Article icon

Ransomware ‘biggest threat facing Australian business’

17-Aug-2020 | Infosecurity Magazine

Article icon

Prevent-ilation: Airing out the Myths of Preventing Cyber Attacks

13-Aug-2020 | CyberScoop

Article icon

NSA, FBI publicize hacking tool linked to Russian military intelligence

9-Aug-2020 | ITP.net

Article icon

Help AG joins forces with CrowdStrike to advance endpoint protection and incident response

6-Aug-2020 | ITWeb

Article icon

Prepare to redeploy security budgets towards cloud, WFH

4-Aug-2020 | Information Age

Article icon

Data breaches down despite pandemic fears

4-Aug-2020 | CyberWire

Article icon

The Daily Briefing: Tuesday, August 4, 2020

3-Aug-2020 | Tech Wire Asia

Article icon

Cybersecurity becomes top priority for APAC business leaders in 2020

31-Jul-2020 | HelpNetSecurity

Article icon

How do I select an endpoint protection solution for my business?

29-Jul-2020 | Intelligent CIO

Article icon

CrowdStrike APJ Report reveals nearly 75% of business leaders see cybersecurity as top priority

29-Jul-2020 | Australian Cyber Security Magazine

Article icon

New Sales Director Appointments at CrowdStrike

29-Jul-2020 | SecurityBrief

Article icon

CrowdStrike announces two executive hires, with aim to expand in A/NZ

29-Jul-2020 | CRN

Article icon

CrowdStrike bolsters Aussie sales leadership

29-Jul-2020 | CRN

Article icon

The Top 25 Technology Disrupters Of 2020

27-Jul-2020 | SecurityBrief

Article icon

CrowdStrike uncovers key cybersecurity findings following COVID-19

21-Jul-2020 | ITProPortal

Article icon

Social engineering: The human component of cyberattacks

20-Jul-2020 | Daily Telegraph

Article icon

‘Big game hunting’: Australian businesses targeted by cyber attacks

19-Jul-2020 | Daily Telegraph

Article icon

Kryptonite Panda: Inside foreign hackers targeting Australia

16-Jul-2020 | Infosecurity Magazine

Article icon

Changing Tactics: Adversaries are Becoming More Brazen and Stealthy in Their Targeting

16-Jul-2020 | Dark Reading

Article icon

8 Signs of a Smartphone Hack

15-Jul-2020 | CybersecAsia

Article icon

APAC region still insufficiently prepared for opportunistic cyber-attacks

6-Jul-2020 | SecurityBrief

Article icon

CrowdStrike recognised as leading endpoint security vendor on global scale

6-Jul-2020 | iTnews

Article icon

Security overhaul underpins Navitas' new digital campus

30-Jun-2020 | MSSP Alert

Article icon

FBI Records 20K COVID-19-Related Cyber Threats in 2020

30-Jun-2020 | Financial Times

Article icon

Hybrid working sets fresh challenge for collaboration tech

30-Jun-2020 | Building Better Healthcare

Article icon

The Perfect Storm

29-Jun-2020 | CyberScoop

Article icon

Senate Democrats push feds to stand up disinformation 'response center' ordered in NDAA

29-Jun-2020 | SecurityBrief

Article icon

Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy

29-Jun-2020 | Computer Weekly

Article icon

Making the case for cloud-based security

28-Jun-2020 | Sky News

Article icon

Business Weekend, Sunday 28th June

26-Jun-2020 | ITProPortal

Article icon

It’s not too late to reverse the predicted near-term cybersecurity crisis

26-Jun-2020 | StateScoop

Article icon

CrowdStrike's Rob Sheldon on election security, cybersecurity during pandemic

25-Jun-2020 | Washington Post

Article icon

The Cybersecurity 202: Few students are getting serious cybersecurity training. That's bad news for the U.S. workforce

25-Jun-2020 | POLITICO

Article icon

CISA’s coronavirus efforts on health care, diversity, election security

25-Jun-2020 | StateScoop

Article icon

Ohio CIO says pandemic prompted statewide cybersecurity push

25-Jun-2020 | EdScoop

Article icon

Tech agility proved essential for university success during pandemic

25-Jun-2020 | ExecutiveGov

Article icon

Tonya Ugoretz: FBI Sees Significant Rise in Cyber Threats Related to COVID-19

25-Jun-2020 | SecurityBrief

Article icon

Illumio launches Zero Trust endpoint protection solution for our digital, remote world

24-Jun-2020 | The Hill

Article icon

FBI sees major spike in coronavirus-related cyber threats

24-Jun-2020 | The Hill

Article icon

Hillicon Valley: Justice Department announces superseding indictment against WikiLeaks' Assange | Facebook ad boycott gains momentum | FBI sees spike in coronavirus-related cyber threats | Boston city government bans facial recognition technology

24-Jun-2020 | FedScoop

Article icon

Air Force wants to reserve its cyber experts for big jobs while AI plays defense

24-Jun-2020 | Meritalk

Article icon

FBI, DoJ Officials Warn of Common COVID-19 Cyber Threat Vectors

24-Jun-2020 | Meritalk

Article icon

CISA’s Ware Runs Down COVID-19 Cyber Threats to Health Sectors

24-Jun-2020 | CyberScoop

Article icon

US cyber officials try to channel Liam Neeson in responding to coronavirus threats

24-Jun-2020 | CyberScoop

Article icon

Don't expect Huawei on DHS's supply chain task force any time soon

24-Jun-2020 | CyberScoop

Article icon

Ransomware operators now threatening to publish stolen data in extortion demands

24-Jun-2020 | CyberScoop

Article icon

Securing voter registration databases takes on added importance in pandemic, DHS official says

24-Jun-2020 | CyberScoop

Article icon

Hackers are still running coronavirus-related campaigns, CrowdStrike warns

24-Jun-2020 | StateScoop

Article icon

Pandemic telework broadened the target area for ransomware attacks, state officials say

24-Jun-2020 | Newsweek

Article icon

Coronavirus-Related Scams Rise as Hackers Take Advantage of Pandemic

23-Jun-2020

Article icon

Illumio Edge Extends Zero Trust To The Endpoint

21-Jun-2020 | Wall Street Journal

Article icon

What’s Keeping CIOs Up at Night

19-Jun-2020 | Infosecurity Magazine

Article icon

Sophisticated State-Backed Attack Rocks Australia

19-Jun-2020 | SC Media

Article icon

‘Dangerous to speculate’ over state-based cyber-attack on Australia without evidence and threat intelligence

16-Jun-2020 | Channel Asia

Article icon

CrowdStrike builds out ASEAN channel play through Exclusive Networks

16-Jun-2020 | Verdict

Article icon

Cybersecurity teams have “inflated” confidence; taking longer to detect threats

16-Jun-2020 | Built in ATX

Article icon

How to Live Your Best Remote Work Life: Advice From a Remote Sales Engineer

11-Jun-2020 | BBC

Article icon

The 'new normal' as cyber-spies navigate pandemic

11-Jun-2020 | The Sydney Morning Herald

Article icon

Australian Uni continuing work on Chinese plane linked to espionage claims

10-Jun-2020 | Tech Wire Asia

Article icon

Why remote workers across APAC say they’re vulnerable to cyber threats

10-Jun-2020 | Computer Weekly

Article icon

Coronavirus: How to go back to the office safely and securely

10-Jun-2020 | Computer Weekly

Article icon

How Australian firms can defend against supply chain attacks

9-Jun-2020 | Fifth Domain

Article icon

The ‘new normal’ marks the best time to implement zero trust security

8-Jun-2020 | ZDNet Asia

Article icon

COVID-19 makes Singapore organisations feel vulnerable to attacks

7-Jun-2020 | Dataquest

Article icon

Attitudes and behaviors towards cybersecurity during the COVID-19 situation: CrowdStrike

3-Jun-2020 | Express Computer

Article icon

61% Indian business leaders think Covid-19 ups cybercrime risk

3-Jun-2020 | Business World

Article icon

2020 CrowdStrike Work Security Index: India Key Findings

3-Jun-2020 | CRN India

Article icon

61% Indian business leaders think Covid-19 ups cybercrime risk: CrowdStrike

3-Jun-2020 | BBC / Public Radio International: The World

Article icon

The cyber war that’s rattling the Middle East

2-Jun-2020 | The Sydney Morning Herald

Article icon

Phishing boom shows no sign of stopping as lockdown starts to lift

2-Jun-2020 | Intelligent Tech Channels

Article icon

Channel Chief: Amanda Adams at CrowdStrike

1-Jun-2020 | The Australian

Article icon

Tech teachings from COVID

27-May-2020 | Computer Weekly

Article icon

CrowdStrike looking to grow MSP channel base

27-May-2020 | Raconteur

Article icon

Hackers smell blood as crisis exposes cyber vulnerabilities

22-May-2020 | SecurityBrief

Article icon

CrowdStrike expands Linux protection, adds machine learning prevention

22-May-2020 | HelpNetSecurity

Article icon

CrowdStrike Falcon® bolsters Linux protection with ML prevention, custom and dynamic IoAs

21-May-2020 | CRN Australia

Article icon

The channel's best WFH setups

21-May-2020 | Dark Reading

Article icon

Telcos Become Richer Hacking Targets

20-May-2020 | Computer Weekly

Article icon

Personal devices putting Singapore employers at risk

20-May-2020 | Singapore Business Review

Article icon

Organisations more susceptible to cyber-attacks during the pandemic

20-May-2020 | People Matters

Article icon

Cyber threat up during COVID-19, but Singapore companies are insufficiently prepared

20-May-2020 | Channelnomics

Article icon

Exabeam, CrowdStrike Partner on Endpoint Security

19-May-2020 | TechBeacon

Article icon

How behavioral analytics tackles advanced threats

18-May-2020 | Australian Banking + Finance

Article icon

Role for banks as SMEs still lag on cyber security

15-May-2020 | SC Magazine

Article icon

Defending against foreign adversaries, eCriminals, and insiders

14-May-2020 | Lawyers Weekly

Article icon

Law firms in top 5 most-breached sectors (and the threat is increasing)

13-May-2020 | Business News Australia

Article icon

Targeted cyber attack leads to data theft at Toll

13-May-2020 | GCN

Article icon

How agencies can defend against pandemic-fueled cyber threats

12-May-2020 | ETCIO.com

Article icon

Reactive security no longer works: Crowdstrike CTO

12-May-2020 | Security Boulevard

Article icon

Businesses Underestimate COVID-19 Cybersecurity Risks

12-May-2020 | Silicon Republic

Article icon

Why all employees need cybersecurity training

12-May-2020 | Channel Partner Insight

Article icon

How COVID-19 is shaking up the MSP market across Europe

11-May-2020 | CMO

Article icon

COVID-19 and the privacy problem

11-May-2020 | CyberWire

Article icon

The CyberWire Daily Podcast, Ep. 1085

11-May-2020 | SDxCentral

Article icon

McAfee, CrowdStrike, Palo Alto Networks Track Evolving COVID-19 Cyberattacks

8-May-2020 | MeriTalk

Article icon

Survey: Most Firms Not Adding to Cyber Training During Pandemic

8-May-2020 | Dark Reading

Article icon

As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints

7-May-2020 | SC Magazine

Article icon

A perfect cyber storm is brewing as Nigerian scammers add to COVID-19 response team woes

7-May-2020 | Security Informed

Article icon

CrowdStrike Cautions UK Businesses Of Looming Cyber Security Threats

7-May-2020 | Intelligent CISO

Article icon

CrowdStrike warns UK businesses of impending cybersecurity crisis

7-May-2020 | TechRepublic

Article icon

These 10 top tech companies posted the most work-from-home jobs in April

7-May-2020 | TechRepublic

Article icon

Businesses are overconfident about the state of their security

7-May-2020 | NextGov

Article icon

Survey Suggests Businesses are Overconfident About Their Security During COVID-19

6-May-2020 | SecurityBrief

Article icon

Australian businesses cybersecurity not up to par during COVID-19

6-May-2020 | Computer Business Review

Article icon

Threat-Actors Will Try To Steal COVID-19 Related Data Warn NCSC and CISA

6-May-2020 | Professional Security Magazine

Article icon

Dominic Raab on cyber

6-May-2020 | Laboratory News

Article icon

Cyber warning issued for key healthcare organisations

6-May-2020 | Intelligent CISO

Article icon

Cybersecurity warning to healthcare organisations involved in Coronavirus response

5-May-2020 | Channel Partner Insights

Article icon

COVID-19 is highlighting the dearth of technical skills within managed security services, claims DACH MSP Kudelski

29-Apr-2020 | Techerati

Article icon

Interview: Crowdstrike’s Zeki Turedi on Covid-19’s long-term impact

29-Apr-2020 | Raconteur

Article icon

Procurement & Supply Chain Innovation

29-Apr-2020 | TechRepublic

Article icon

COVID-19: Summer internships aren't going away, but they may look very different this year

29-Apr-2020 | Government Technology

Article icon

Bad Actors Have Adapted Well to the Pandemic Crisis

24-Apr-2020 | The Australian Financial Review

Article icon

Amazon to store data from virus tracing app

24-Apr-2020 | Business Info

Article icon

Roundup of the free services and offerings for businesses during COVID-19

24-Apr-2020 | TechTarget

Article icon

Coronavirus phishing threats force heightened user awareness

24-Apr-2020 | Defense News

Article icon

In chaos, there’s opportunity … and that’s bad news

24-Apr-2020 | Australian Associated Press

Article icon

Install virus app to aid health carers: PM

24-Apr-2020 | Security Ledger

Article icon

Experts warn COVID-19 raises Stakes for Nation State Info-Ops Targeting US

23-Apr-2020 | Raconteur

Article icon

Five cyberthreats you need to watch out for

22-Apr-2020 | Politico

Article icon

Morning Cybersecurity: How to secure telework

22-Apr-2020 | TechCrunch

Article icon

CrowdStrike’s new CTO says the coronavirus era is ‘business as usual’

20-Apr-2020 | ITProPortal

Article icon

Best practices from a remote-first organisation

20-Apr-2020 | AiThority

Article icon

AiThority Interview with Michael Sentonas, CTO at CrowdStrike

15-Apr-2020 | Protocol

Article icon

How to manage Slack and email for laid-off and furloughed workers

15-Apr-2020 | Financial Times

Article icon

Cyber attackers target financial advisers’ lax defences

14-Apr-2020 | MarTech Series

Article icon

TechBytes with Michael Sentonas, CTO at CrowdStrike

14-Apr-2020 | Australian Banking and Finance

Article icon

Remote workplaces ripe for COVID-19 cyber attacks

14-Apr-2020 | CSO

Article icon

How CISOs can best assess geopolitical risk factors

14-Apr-2020 | Wall Street Journal

Article icon

Looking for a Job? Big Tech Is Still Hiring

13-Apr-2020 | Silicon UK

Article icon

Ransomware Gang Releases Secret Industrial Documents

11-Apr-2020 | TechCrunch

Article icon

Decrypted: Zoom’s security fallout, Crowdstrike’s new CTO, Bugcrowd raises $30M

8-Apr-2020 | Bloomberg

Article icon

U.S., U.K. Issue Alert on Growing Use of Covid-themed Hacks

8-Apr-2020 | Sky News

Article icon

University of Warwick hiding data security risks from students and staff

6-Apr-2020 | Profile

Article icon

Burt Podbere on How to Run a Successful IPO

5-Apr-2020 | Sky News

Article icon

Coronavirus: Cyber criminals threaten to hold hospitals to ransom - Interpol

3-Apr-2020 | HelpNetSecurity

Article icon

CrowdStrike customers can now reduce endpoint attack surface with Automox through CrowdStrike Store

2-Apr-2020 | Bdaily

Article icon

Roundup of the best services and offerings for businesses during COVID-19

1-Apr-2020 | TechCrunch

Article icon

How bad will SaaS churn get in the downturn?

1-Apr-2020 | Bloomberg

Article icon

Okta Partners with VMware, CrowdStrike to Boost Log-In Security

24-Mar-2020 | Dark Reading

Article icon

Cybercriminals' Promises to Pause During Pandemic Amount to Little

23-Mar-2020 | Threatpost

Article icon

WHO Targeted in Espionage Attempt, COVID-19 Cyberattacks Spike

22-Mar-2020 | Raconteur

Article icon

How to stay cyber-secure while working from home

20-Mar-2020 | StateScoop

Article icon

Coronavirus cybercrime task force launches in Virginia

20-Mar-2020 | Government Technology

Article icon

Hackers Have Been Waiting for an Opportunity Like Coronavirus

19-Mar-2020 | Bloomberg

Article icon

Cyber Risks Abound as Employees Shift From Offices to Homes

19-Mar-2020 | Business Insider

Article icon

The coronavirus crisis is forcing the entire cybersecurity industry to change just to keep up, and experts warn not every startup will make it

19-Mar-2020 | TechTarget

Article icon

Deepfakes: Security experts undecided on the threat level

19-Mar-2020 | Solutions Review

Article icon

Key Findings – The Forrester Wave: Enterprise Detection and Response, Q1 2020

18-Mar-2020 | Defense Systems

Article icon

Mass teleworking causes spike in DOD network attacks

17-Mar-2020 | CSO

Article icon

The 10 most powerful cybersecurity companies

16-Mar-2020 | Financial Times

Article icon

US health department targeted in cyber attack

16-Mar-2020 | New York Times

Article icon

Hackers Attack Health and Human Services Computer System

15-Mar-2020 | USA Today

Article icon

Working from home because of coronavirus? Be careful what you download to keep cybersafe

13-Mar-2020 | NBC

Article icon

Intelligence agencies use coronavirus information to target enemies, analysts say

13-Mar-2020 | Politico

Article icon

Tracing the spread of coronavirus scams

13-Mar-2020 | Fifth Domain

Article icon

The IT challenges of getting feds to work from home

13-Mar-2020 | MSSP Alert

Article icon

eSentire MDR in EMEA: 134% YoY Increase in New Bookings in 2019

12-Mar-2020 | NBC

Article icon

Coronavirus scammers are seeking to profit off the deadly virus

11-Mar-2020 | CBS

Article icon

Cybercriminals are capitalizing on coronavirus fears, security firm warns

11-Mar-2020 | Forbes

Article icon

The Tycoon Hunting Down The World’s Hackers—And Fending Off A Trump Ukraine Conspiracy Theory

11-Mar-2020 | Defense One

Article icon

More Industry Regulations Are Needed to Improve US Cybersecurity, Congressional Report Says

10-Mar-2020 | Accountants Daily

Article icon

Accounting firms are ‘prime targets’, says cyber security firm

10-Mar-2020 | CybersecAsia

Article icon

‘Lure and decoy’ cyber-threats exploit COVID-19

10-Mar-2020 | IPWatchdog

Article icon

Global Threat Report Has Key Takeaways for IP-Intensive Companies

9-Mar-2020 | ExecutiveBiz

Article icon

CrowdStrike’s Thomas Etheridge: Agencies Must Have ‘Thorough Understanding’ of Endpoint Cybersecurity

9-Mar-2020 | India Tech Online

Article icon

CrowdStrike report details active cyber adversaries who are targeting India

9-Mar-2020 | The Australian Financial Review

Article icon

Aussie telcos could face retaliation from China after Huawei failure

9-Mar-2020 | Deccan Herald

Article icon

Cyberattacks hit local govts and tech sector most in 2019

6-Mar-2020 | Bank Info Security

Article icon

Big Game Hunting: How to Defend

6-Mar-2020 | CybersecAsia

Article icon

Going a-phishing with COVID-19

6-Mar-2020 | Dataquest

Article icon

Big game hunting, telecom targeting take center stage for cyber adversaries

6-Mar-2020 | InfoPackets

Article icon

Malware-Free Cyber Attacks on the Rise

6-Mar-2020 | MeriTalk

Article icon

CrowdStrike Report Highlights Threat to Telecoms, Public Institutions

6-Mar-2020 | NextGov

Article icon

How to Stop ‘Force Multiplier’ Tactics from Hitting Your Supply Chain

5-Mar-2020 | Business Standard

Article icon

Algo rhythm: Activity in cyberspace since the revocation of J&K autonomy

5-Mar-2020 | Channel Futures

Article icon

MSPs Under Heavy Ransomware Attack

5-Mar-2020 | CISO Magazine

Article icon

CrowdStrike Report Reveals Telecommunications Industry Attacks on the Rise

5-Mar-2020 | Cyber Risk Leaders

Article icon

CrowdStrike Global Threat Report Reveals Big Game Hunting, Telecommunication Targeting Take Centre Stage for Cyber Adversaries

5-Mar-2020 | CybersecAsia

Article icon

Global non-malware cyberattacks exceeded malware-based threats last year: report

5-Mar-2020 | Security Affairs

Article icon

Most of the attacks on Telecom Sector in 2019 were carried out by China-linked hackers

4-Mar-2020 | AIthority

Article icon

CrowdStrike Global Threat Report Reveals Big Game Hunting, Telecommunication Targeting Take Center Stage

4-Mar-2020 | Dark Reading

Article icon

Most Cyberattacks in 2019 Were Waged Without Malware

4-Mar-2020 | FCW

Article icon

Insider: March 4

4-Mar-2020 | GCN

Article icon

Ransomware evolves from side hustle to main gig

4-Mar-2020 | HelpNetSecurity

Article icon

A massive increase in eCrime behavior can easily disrupt business operations

4-Mar-2020 | ITProPortal

Article icon

e-Crime is the top threat businesses are facing

4-Mar-2020 | SC Magazine

Article icon

CrowdStrike report: In a first, majority of attacks in 2019 were malware-free

4-Mar-2020 | SecurityBrief

Article icon

Financial cybercrime happened 'almost continuously' in 2019

4-Mar-2020 | TechTarget

Article icon

Should ransomware payments be insurable? Experts weigh in

4-Mar-2020 | Techtree

Article icon

Malware-free Cyber Attacks on the Upswing

4-Mar-2020 | Dark Reading

Article icon

EternalBlue Longevity Underscores Patching Problem

4-Mar-2020 | Sportscar365

Article icon

Braun Excited to “Turn Up the Intensity” in DXDT Return

3-Mar-2020 | Bloomberg

Article icon

U.S. Adversaries Are Getting Even Better at Hacking, Crowdstrike Says

3-Mar-2020 | Bloomberg Government

Article icon

What to Know in Washington: Biden Surges Ahead of Super Tuesday

3-Mar-2020 | Becker's Hospital Review

Article icon

Hospitals should employ 1-10-60 rule to counter cyberattacks

3-Mar-2020 | Channelnomics

Article icon

CrowdStrike: MSPs in Cyber-Criminal Crosshairs

3-Mar-2020 | CDR Info

Article icon

Cybersecurity Report Reveals Big Game Hunting, Telecommunication Targeting Take Center Stage for Cyber Adversaries

3-Mar-2020 | CyberWire

Article icon

Daily Briefing

3-Mar-2020 | FCW

Article icon

Report: Hackers target telecoms, defense contractors

3-Mar-2020 | Forbes

Article icon

These 3 Magic Numbers Could Stop Chinese, Iranian And Russian Cyber Attacks

3-Mar-2020 | Inside Cybersecurity

Article icon

CrowdStrike report finds ransomware tactics becoming more ‘cutthroat’ as threats escalate

3-Mar-2020 | International Business Times

Article icon

Cybercrimes On The Rise? New Reports Show How Nation-States Playing Wider Hacking Role For Political Gain

3-Mar-2020 | MSSP Alert

Article icon

2020 Global Threat Report: Malware-Free Attacks on the Rise

3-Mar-2020 | MSSP Alert

Article icon

Managed Security Services Provider (MSSP) News: 03 March 2020

3-Mar-2020 | Politico

Article icon

Are states ready to defend Super Tuesday?

3-Mar-2020 | SecurityWeek

Article icon

Telecom Sector Increasingly Targeted by Chinese Hackers: CrowdStrike

3-Mar-2020 | TechRadar

Article icon

e-Crime is the top threat businesses are facing

3-Mar-2020 | TechRepublic

Article icon

CrowdStrike's 2020 Threat Report: Spammers finetune email thread hijacking

3-Mar-2020 | ZDNet Asia

Article icon

Malware-free' attacks now most popular tactic amongst cybercriminals

3-Mar-2020 | FCW

Article icon

DOJ's totally non-binding guide to legal cyber research

2-Mar-2020 | Wall Street Journal

Article icon

Two Chinese Nationals Indicted in Alleged North Korean Bitcoin Hack

2-Mar-2020 | ZDNet

Article icon

Eight leading AI/ML cybersecurity companies in 2020

28-Feb-2020 | ChannelLife

Article icon

CrowdStrike adds variety of new tools

27-Feb-2020 | SC Media

Article icon

The winners of the 2020 SC Awards Honored in the U.S.

26-Feb-2020 | SDxCentral

Article icon

The Russians Are Coming for Your Network

25-Feb-2020 | SecurityWeek

Article icon

RSA Conference 2020: Product Announcement Summary (Day 2)

25-Feb-2020 | Channelnomics

Article icon

CrowdStrike Bolsters Cloud EDR Platform for MSSPs

25-Feb-2020 | HelpNetSecurity

Article icon

CrowdStrike Endpoint Recovery Services: Accelerating business incident recovery

25-Feb-2020 | MSSP Alert

Article icon

CrowdStrike Unveils Developer Portal for MSSPs, Partners

25-Feb-2020 | MSSP Alert

Article icon

MSSP News: 25 February 2020

25-Feb-2020 | Enterprise Times

Article icon

Is OpenDXL Ontology, Tolkien’s One Ring for cybersecurity?

24-Feb-2020 | ZDNet

Article icon

Cybersecurity alliance launches first open source messaging framework for security tools

24-Feb-2020 | CRN

Article icon

The 20 Coolest Endpoint Security Companies Of 2020: The Security 100

24-Feb-2020 | SecurityWeek

Article icon

RSA Conference 2020: Product Announcement Summary (Day 1)

24-Feb-2020 | SiliconANGLE

Article icon

With new release, CrowdStrike targets Google Cloud, Azure and container adopters

24-Feb-2020 | WIRED

Article icon

The US Blames Russia's GRU for Sweeping Cyberattacks in Georgia

19-Feb-2020 | Computer Business Review

Article icon

Mitigating Risk in Supply Chain Attacks

6-Feb-2020 | Fifth Domain

Article icon

Cybersecurity AI is ready for prime time: why the skeptics are wrong

30-Jan-2020 | Silicon.co.uk

Article icon

Azure: The Future for Your Datacentre?

28-Jan-2020 | Entrepreneur

Article icon

Business Disruption Becoming Main Attack Objective For More Adversaries

28-Jan-2020 | SC Magazine

Article icon

Don't get distracted by the Emperor's new clothes

22-Jan-2020 | Infosecurity Magazine

Article icon

Knowing Your Enemy: Attack Attribution in Cybersecurity

17-Jan-2020 | Inc

Article icon

Phishing Is Getting More Sophisticated. Here's What to Look Out For

16-Jan-2020 | InfoSecurity Magazine

Article icon

Business Disruption Attacks Most Prevalent in Last 12 Months

15-Jan-2020 | MSSP Alert

Article icon

Managed Security Services Provider (MSSP) News: 15 January 2020 - MSSP Alert

14-Jan-2020 | The CyberWire

Article icon

Daily briefing

14-Jan-2020 | Dark Reading

Article icon

Attackers Increasingly Focus on Business Disruption

14-Jan-2020 | Inside Cybersecurity

Article icon

CrowdStrike report warns that cyber aggressors are sharpening their tools

14-Jan-2020 | Roll Call

Article icon

Cyberattackers lurking longer inside computers, report finds

14-Jan-2020 | StateScoop

Article icon

Ransomware attacks matured in 2019, report says

14-Jan-2020 | TechTarget

Article icon

CrowdStrike: Intrusion self-detection, dwell time both increasing

14-Jan-2020 | POLITICO

Article icon

Business disruption a top goal for hackers in 2019, CrowdStrike says

8-Jan-2020 | CyberScoop

Article icon

Saudi cyber authority uncovers new data-wiping malware, and experts suspect Iran is behind it

8-Jan-2020 | The Economist

Article icon

Iran retaliates for the killing of Qassem Suleimani

8-Jan-2020 | Dark Reading

Article icon

DHS Warns of Potential Iranian Cyberattacks

8-Jan-2020 | SDX Central

Article icon

Iran Cyberattacks Targeting US Companies Imminent, Experts Warn

7-Jan-2020 | Washington Post

Article icon

The Cybersecurity 202

7-Jan-2020 | The Hill

Article icon

DHS issues bulletin warning of potential Iranian cyberattack

7-Jan-2020 | MeriTalk

Article icon

U.S.-Iran Tensions Spark Renewed CISA Call for Cyber Vigilance

5-Jan-2020 | TechCrunch

Article icon

CrowdStrike's CEO on How to IPO, direct listings, and what's ahead for SaaS startups

27-Dec-2019 | IT Pro Portal

Article icon

App stores could give bad actors a one-way ticket to your mobile

23-Dec-2019 | Washington Technology

Article icon

RESOLVED: Start now to prepare for CMMC in 2020

20-Dec-2019 | ZDNet

Article icon

Ransomware: The number of victims paying up is on the rise, and that's bad news

20-Dec-2019 | IT Pro Portal

Article icon

Huge increase UK organisations paying ransomware demands

17-Dec-2019 | IT Europa

Article icon

Telefónica MSSP to offer CrowdStrike solution across Europe

16-Dec-2019 | CRN

Article icon

Brisbane's Baidam Solutions joins CrowdStrike's Elevate partner program

11-Dec-2019 | Intelligent CISO

Article icon

CrowdStrike expert on the cyber metric that works for CISOs and the board

10-Dec-2019 | CRN

Article icon

The 10 Hottest New Cybersecurity Tools Of 2019

5-Dec-2019 | Bloomberg

Article icon

Russian ‘Evil Corp’ Is Behind a Decade of Hacks, U.S. Says

25-Nov-2019 | ARN

Article icon

ARN Women in ICT Awards 2019: and the winners are…

21-Nov-2019 | ZDNet

Article icon

Singapore firms take 118 hours to detect, contain cyber attacks

21-Nov-2019 | CSO

Article icon

Australian businesses slower to detect breaches than global peers, but everyone is still taking too long

21-Nov-2019 | Lawyers Weekly

Article icon

Best practices for prevention and immediate response to a breach

20-Nov-2019 | Nikkei xTECH

Article icon

Japan's time from threat detection to remediation is 1.4 times that of the world, the latest survey of US cloud strikes

20-Nov-2019 | HelpNetSecurity

Article icon

Only 11% of organizations can detect intruders in under one minute

20-Nov-2019 | WIRED

Article icon

A Notorious Iranian Hacking Crew Is Targeting Industrial Control Systems

19-Nov-2019 | Reseller News

Article icon

Wipro builds out security credentials through CrowdStrike

19-Nov-2019 | ARN

Article icon

Wipro builds out security credentials through CrowdStrike

19-Nov-2019 | TechTarget

Article icon

CrowdStrike: Incident response times still too long

19-Nov-2019 | Dark Reading

Article icon

Most Companies Lag Behind '1-10-60' Benchmark for Breach Response

19-Nov-2019 | Politico

Article icon

CrowdStrike Report Paints Picture on Breach Response Capabilities

19-Nov-2019 | NextGov

Article icon

What Government Employees Need to Know About Ransomware

19-Nov-2019 | MeriTalk

Article icon

Nation-State, Supply Chain Cyberattacks Are Top Concerns, CrowdStrike Says

13-Nov-2019 | Bloomberg

Article icon

A Hacker Wants About $5 Million in Ransom From Pemex By End of November

12-Nov-2019 | CSO

Article icon

When moving to cloud, don’t lift-and-shift your security techniques

12-Nov-2019 | Bloomberg

Article icon

Pemex Faces Payment Problems After Cyber Attack Shut System

6-Nov-2019 | The Globe and Mail

Article icon

Nunavut reels after ‘ransomware’ attack knocks out government services

5-Nov-2019 | Silicon Angle

Article icon

CrowdStrike’s Falcon security platform lands on AWS with new container features

5-Nov-2019 | MSSP Alert

Article icon

Fal.Con UNITE 2019

5-Nov-2019 | CBR

Article icon

Everis Hacked: Ransomware Sample Emerges, Company Silent on Attack

5-Nov-2019 | CRN

Article icon

8 Hot New CrowdStrike Features Unveiled At Fal.Con UNITE 2019

4-Nov-2019 | Threatpost

Article icon

Wizard Spider Upgrades Ryuk Ransomware to Reach Deep into LANs

29-Oct-2019 | Security Brief

Article icon

How to level up Australia’s cybersecurity productivity – CrowdStrike

29-Oct-2019 | FCW

Article icon

Rising Star: Robert G. Sheldon

28-Oct-2019 | GovCyberHub

Article icon

Easy targets? Why healthcare and government ransomware attacks are on the rise

28-Oct-2019 | CSO

Article icon

Australian critical infrastructure, healthcare organisations among 19 confirmed Emotet victims

22-Oct-2019 | Threatpost

Article icon

Turla Compromises, Infiltrates Iranian APT Infrastructure

22-Oct-2019 | New York Times

Article icon

China Sharpens Hacking to Hound Its Minorities, Far and Wide

20-Oct-2019 | Infosecurity Magazine

Article icon

Chinese National Gets 40 Months for Exporting US Military Kit

19-Oct-2019 | Intelligent CISO

Article icon

CrowdStrike report reveals prolific adversary trends and tactics

19-Oct-2019 | Fortune

Article icon

Chinese Hacking: The Plane Made from Stolen Tech?—Cyber Saturday

18-Oct-2019 | Channelnomics

Article icon

DLT, CrowdStrike Lauch Government Security Forum

14-Oct-2019 | IT Security Guru

Article icon

By the time you've been compromised it's already too late

14-Oct-2019 | Infosecurity Magazine

Article icon

Revealed: State-Sponsored Campaign that Helped China Build an Aircraft

14-Oct-2019 | Computing

Article icon

Cyber espionage campaign helped China acquire intellectual property behind C919 airplane

14-Oct-2019 | Dark Reading

Article icon

Cyber Theft, Humint Helped China Cut Corners on Passenger Jet

14-Oct-2019 | Roll Call

Article icon

Report: Underground hackers and spies helped China steal jet secrets

14-Oct-2019 | CSO

Article icon

Report: China supported C919 airliner development through cyberespionage

14-Oct-2019 | Computer Weekly

Article icon

Researchers reveal the cyber campaign that built China's new airliner

14-Oct-2019 | ZDNet

Article icon

Building China's Comac C919 airplane involved a lot of hacking, report says

8-Oct-2019 | ZDNet

Article icon

Ransomware: Why we're still losing the fight – and the changes you need to make, before it's too late

8-Oct-2019 | Retail Biz

Article icon

Five tips to protect your business against cyber crime

8-Oct-2019 | Diginomica

Article icon

Mercedes-AMG Petronas Motorsports steers systems security with CrowdStrike

8-Oct-2019 | Computer Weekly

Article icon

CIO interview: Matt Harris, head of IT, Mercedes-AMG Petronas Motorsport

6-Oct-2019 | ZDNet

Article icon

APAC firms will need AI as speed increasingly critical in cyberdefence

25-Sep-2019 | CIOL

Article icon

2019 Mobile Threat Landscape: How to stay safe?

24-Sep-2019 | Dark Reading

Article icon

Iranian Government Hackers Target US Veterans

13-Sep-2019 | Washington Post

Article icon

U.S. imposes sanctions on North Korean hackers accused in Sony attack, dozens of other incidents

13-Sep-2019 | ZDNet

Article icon

US Treasury sanctions three North Korean hacking groups

13-Sep-2019 | Dark Reading

Article icon

US Sanctions 3 Cyberattack Groups Tied to DPRK

13-Sep-2019 | NextGov

Article icon

9 Tips to Help Secure Every Federal Employee’s Mobile Device

10-Sep-2019 | Federal News Network

Article icon

Not just feds, all government levels vulnerable to ransomware attacks

3-Sep-2019 | StateScoop

Article icon

Recent ransomware surge linked to Russian criminal group

3-Sep-2019 | SC Magazine

Article icon

North Korea denies $2.2bn state sponsored cyber-crime spree

27-Aug-2019 | Dark Reading

Article icon

CrowdStrike Launches Fund for Early-Stage Endpoint Security Startups

26-Aug-2019 | Data Breach Today

Article icon

Down and Out in Hacktivist Land

26-Aug-2019 | Business Insider

Article icon

Less than 3 months after its blockbuster IPO, CrowdStrike is launching a $20 million VC fund to invest in early-stage security startups, and its partnering with Accel

22-Aug-2019 | Fifth Domain

Article icon

Closing the talent gap for public sector cybersecurity

19-Aug-2019 | Washington Post

Article icon

Ransomware attacks are an expensive threat to city and state governments. They won’t ebb anytime soon.

19-Aug-2019 | Fifth Domain

Article icon

Cyber Command changed its approach. Is the difference noticeable?

19-Aug-2019 | CNBC

Article icon

Online fraudsters on the prowl: Here is how you can keep your mobile devices secure

19-Aug-2019 | Diginomica

Article icon

Cloud-based app backends - a rat's nest of mobile phone security vulnerabilities

12-Aug-2019 | CSO

Article icon

Businesses risk becoming “collateral damage” in nation-state cyber wars

12-Aug-2019 | TechTarget

Article icon

Black Hat 2019 brings out new security, protection offerings

6-Aug-2019 | CRN

Article icon

12 Cool New Threat Detection And Response Products Unveiled At Black Hat 2019

6-Aug-2019 | MSSP Alert

Article icon

Black Hat USA 2019: Day 3 News and Analysis

6-Aug-2019 | Cybersecurity Asean

Article icon

Maintaining the Pace with the Ever-Evolving Threat Landscape

6-Aug-2019 | Data Economy

Article icon

Cybersecurity Catastrophes Cured By AI

6-Aug-2019 | Express Computer

Article icon

‘Critical National Infrastructure Is A Tempting Target For Cyber Threat Actors’

6-Aug-2019 | CRN

Article icon

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

5-Aug-2019 | Infosecurity Magazine

Article icon

Next Generation Cyber: Malware-Free Attacks

31-Jul-2019 | Channel News

Article icon

OZ Mobile Users Under Attack By ‘Nation-States’

31-Jul-2019 | Business Insider

Article icon

A "underground industry" is banking on banking apps like N26 and Revolut

31-Jul-2019 | Security Insider

Article icon

Analysis of mobile cyber threats

31-Jul-2019 | SecurityWeek

Article icon

Mobile Malware and Mobile Attackers are Getting More Sophisticated

31-Jul-2019 | Threat Post

Article icon

Nation-State Actors Go All-In on Mobile Malware

30-Jul-2019 | PC Mag

Article icon

Cybersecurity Organizations Warn on Nation-State and Insider Threats

30-Jul-2019 | MeriTalk

Article icon

Mobile Threat Landscape Report Released

30-Jul-2019 | The New Daily

Article icon

Mobile phone malware attacks are on the rise. Here’s how to protect your smartphone

30-Jul-2019 | Forbes

Article icon

iPhone Users Warned As Malware Developers, And The U.S. Supreme Court, Target Apple

30-Jul-2019 | Computer Weekly

Article icon

Mobiles top target of nation state surveillance

30-Jul-2019 | ZDNet

Article icon

Why nation-state hacking groups are increasingly turning to mobile malware

29-Jul-2019 | Business Chief

Article icon

Crowdstrike: how to stay cyber security productive

29-Jul-2019 | SC Magazine

Article icon

Tackling the cyber-security talent gap

23-Jul-2019 | CSO

Article icon

Endpoint Security: tackling vulnerabilities that hide in plain sight

22-Jul-2019 | CRN

Article icon

The 10 Coolest New Cybersecurity Tools And Products Of 2019 (So Far)

20-Jul-2019 | Fortune

Article icon

Lessons from the Pentagon, Oracle, CrowdStrike, and an Ex-CIA Entrepreneur at Brainstorm Tech 2019—Cyber Saturday

18-Jul-2019 | GCN

Article icon

If agencies aren’t threat hunting, they’re failing

16-Jul-2019 | Security Now

Article icon

New BitPaymer Ransomware Discovered Hunting Big Game

15-Jul-2019 | Dark Reading

Article icon

Meet DoppelPaymer, BitPaymer's Ransomware Lookalike

15-Jul-2019 | Bleeping Computer

Article icon

New DoppelPaymer Ransomware Emerges from BitPaymer's Code

15-Jul-2019 | Security Week

Article icon

Forked Version of BitPaymer Ransomware Emerges

9-Jul-2019 | ISMG

Article icon

Threat Intelligence: Why Sharing Is Difficult

1-Jul-2019 | SC Media

Article icon

CrowdStrike Falcon® 4.x

27-Jun-2019 | BizTechMagazine

Article icon

Why Cybersecurity Teams Must Account for Breakout Time

25-Jun-2019 | CSO

Article icon

Review: CrowdStrike Falcon® breaks the EDR mold

25-Jun-2019 | The Guardian

Article icon

US launched cyber attack on Iranian rockets and missiles – reports

25-Jun-2019 | The Inquirer

Article icon

US launches cyberattacks against Iran's weapon systems

25-Jun-2019 | SZ.de

Article icon

Hacker Attack

25-Jun-2019 | Sky News

Article icon

Iran tensions: Donald Trump says he is 'not looking for war'

22-Jun-2019 | Daily Mail

Article icon

Upsurge in Iranian hacking attempts against US gas and oil companies, experts warn

22-Jun-2019 | AP

Article icon

US struck Iranian military computers this week

22-Jun-2019 | Fifth Domain

Article icon

What to make of US cyber activities in Iran

22-Jun-2019 | Time

Article icon

Iranian Hackers Wage Cyber Campaign Amid Ongoing Tensions With the U.S.

22-Jun-2019 | Washington Post

Article icon

Here's how Iran disrupted U.S. businesses the last time it launched major cyberattacks

20-Jun-2019 | WIRED

Article icon

Iranian Hackers Launch a New U.S.-Targeted Campaign as Tensions Mount

19-Jun-2019 | ZDNet

Article icon

Cybersecurity: Three hacking trends you need to know about to help protect yourself

19-Jun-2019 | Channel Asia

Article icon

CrowdStrike strengthens South Asia channel through distribution

12-Jun-2019 | Bloomberg

Article icon

CrowdStrike Almost Doubles in Debut as Tech IPOs Rush Ahead

12-Jun-2019 | The Wall Street Journal Pro Venture Capital

Article icon

Cybersecurity Firm CrowdStrike Prices IPO Above Expected Range

12-Jun-2019 | Seeking Alpha

Article icon

IPO news: Tobacco, chat and cyber

12-Jun-2019 | Investor’s Business Daily

Article icon

Dow Jones Futures: Elon Musk Touts 'Record' Tesla Quarter; These Stocks Are Big Movers

12-Jun-2019 | Tradimo

Article icon

CrowdStrike (CRWD) starts trading today

12-Jun-2019 | TheStreet

Article icon

CrowdStrike IPO Prices at $34 a Share Ahead of Nasdaq Debut

12-Jun-2019 | StreetInsider

Article icon

CrowdStrike Holdings Inc. (CRWD) Prices 18M Class A Share IPO at $34/Sh

12-Jun-2019 | Forbes

Article icon

Can CrowdStrike’s 109% Growth Make It A Successful IPO?

12-Jun-2019 | AlphaStreet

Article icon

IPO: Things to know as Crowdstrike makes a scintillating market debut

12-Jun-2019 | Renaissance Capital

Article icon

Following the crowd: CrowdStrike prices IPO at $34, above the revised range

12-Jun-2019 | Seeking Alpha

Article icon

These Are The Times When ‘ Buy The Dip’ Guys Get Nailed, Caution!

12-Jun-2019 | Investor’s Business Daily

Article icon

Stock Futures Scrape Lower; Qualcomm, Cisco Systems Lead Early Declines

12-Jun-2019 | The New York Times

Article icon

DealBook Briefing: T-Mobile’s Sprint Deal Is in Big Trouble

12-Jun-2019 | Investor’s Business Daily

Article icon

Nasdaq Dips, But United Technologies Bolsters Dow Jones

12-Jun-2019 | Fortune

Article icon

Term Sheet - Wednesday, June 12

12-Jun-2019 | Axios

Article icon

Pro Rata

12-Jun-2019 | Yahoo! Finance

Article icon

Crowdstrike set to begin trading on the Nasdaq (VIDEO)

12-Jun-2019 | Crunchbase News

Article icon

CrowdStrike Prices IPO Above Range, Setting $6.6B Valuation

11-Jun-2019 | CNBC

Article icon

CrowdStrike prices IPO at $34, above range

11-Jun-2019 | Silicon Valley Business Journal

Article icon

CrowdStrike stock soars after record-breaking cybersecurity IPO

30-May-2019 | NextGov

Article icon

NSA Deflects Blame for Baltimore Ransomware Attack

28-May-2019 | CNET

Article icon

The internet is changing Africa, mostly for the better

28-May-2019 | SC Magazine UK

Article icon

Who's behind the keyboard: The biggest threat actors challenging your current security strategy

28-May-2019 | Security Brief AU

Article icon

CrowdStrike: Best practices for mobile device security

22-May-2019 | CSO

Article icon

Incident Response in the Age of New Compliance Requirements

21-May-2019 | ITProPortal

Article icon

Life beyond malware

16-May-2019 | FedTechMagazine

Article icon

Cyberattackers Can Cause Damage in the Blink of an Eye

16-May-2019 | Entrepreneur

Article icon

Can Your Company Benefit From Hiring Remote Workers?

16-May-2019 | CISO Mag

Article icon

CrowdStrike and InPhySec join hands to accelerate cybersecurity solutions in New Zealand

15-May-2019 | Security Brief AU

Article icon

InPhySec forges partnership to tackle NZ cybersecurity market

15-May-2019 | ChannelLife

Article icon

InPhySec forges partnership to tackle NZ cybersecurity market

9-May-2019 | AI Authority

Article icon

Enosys Solutions Joins CrowdStrike’s Elevate Partner Program

8-May-2019 | Information Age

Article icon

Caught in the spiders web: demystifying the eCrime cyber network

7-May-2019 | ITWire

Article icon

CrowdStrike endpoint platform can now detect firmware attacks

7-May-2019 | Dark Reading

Article icon

The Big E-Crime Pivot

3-May-2019 | Channel Life AU

Article icon

CrowdStrike integrates firmware attack detection in endpoint protection

2-May-2019 | CRN

Article icon

Hacktivists Are on the Rise — but Less Effective Than Ever

2-May-2019 | TechTarget

Article icon

CrowdStrike tackles BIOS attacks with new Falcon features

30-Apr-2019 | CSO

Article icon

Going beyond malware; the rise of 'living off the land' attacks

30-Apr-2019 | ZDnet

Article icon

Vietnam 'on the edge' of becoming a mid-tier cybercrime hub

29-Apr-2019 | Dark Reading

Article icon

Peer to Peer Vulnerability Exposes Millions of IOT Devices

26-Apr-2019 | TechRadarPro

Article icon

Staying one step ahead of the cyber-security hydra

22-Apr-2019 | CBR

Article icon

Mimikatz: “The AK47 of Cyber Attacks”

22-Apr-2019 | Forbes

Article icon

A Government Hacks The Web’s Phone Book—And Erodes Trust In The Internet

21-Apr-2019 | NextGov

Article icon

Speed: The Most Essential Concept in Cyber

21-Apr-2019 | Security Brief AU

Article icon

CrowdStrike: Improving network security with cloud computing solutions

18-Apr-2019 | CyberScoop

Article icon

How companies – and the hackers themselves – could respond to the OilRig leak

18-Apr-2019 | Inside Small Businees

Article icon

How to keep your data secure while travelling

16-Apr-2019 | CRN

Article icon

The Wipro Breach: Why Managed Service Providers Are At Risk

16-Apr-2019 | The Hill

Article icon

Cybersecurity Advisory Committee will strengthen national security through a stronger public-private partnership

11-Apr-2019 | CSO India

Article icon

Cyber espionage shows no signs of slowing down: Michael Sentonas, CrowdStrike

9-Apr-2019 | Business Insider Germany

Article icon

Ranking: These are the fastest cyber armies in the world

4-Apr-2019 | CyberScoop

Article icon

German drug giant Bayer blames Chinese hacking group Wicked Panda for breach

4-Apr-2019 | Infosecurity Magazine

Article icon

Cyber-Attack on Bayer Shows No Signs of Data Theft

3-Apr-2019 | Infosecurity Magazine

Article icon

A Spot of Ransomware Hits AriZona's Tea

2-Apr-2019 | TechCrunch

Article icon

Arizona Beverages knocked offline by ransomware attack

2-Apr-2019 | CSO

Article icon

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

1-Apr-2019 | Business World India

Article icon

Crowdstrike Redefines Endpoint Security For Protection Against All Types Of Cyber Attacks

1-Apr-2019 | The National

Article icon

Iran continues to be a major cyber threat to the Middle East

27-Mar-2019 | Ars Technica

Article icon

A rogue’s gallery of bad actors is exploiting that critical WinRAR flaw

27-Mar-2019 | SC Magazine

Article icon

EC3 advisory group issues recommendations to combat phishing

27-Mar-2019 | CRN

Article icon

10 Hottest Threat Intelligence Platforms In 2019

26-Mar-2019 | TechTarget

Article icon

CrowdStrike: Cybercrime groups joining forces to pack more punch

21-Mar-2019 | Data Breach Today

Article icon

Repeat Trick: Malware-Wielding Criminals Collaborate

20-Mar-2019 | CEO Magazine

Article icon

The rise of AI

19-Mar-2019 | Security Week

Article icon

Aluminum Giant Norsk Hydro Hit by Ransomware

19-Mar-2019 | Security Brief AU

Article icon

Forrester names Crowdstrike leader in incident response

19-Mar-2019 | Solutions Overview

Article icon

4 Leaders in the Forrester Wave: Cybersecurity Incident Response Services, Q1 2019

19-Mar-2019 | WSJ

Article icon

Norsk Hydro Is Hit by Ransomware Cyberattack

19-Mar-2019 | HelpNetSecurity

Article icon

Norsk Hydro cyber attack: What happened?

19-Mar-2019 | Dark Reading

Article icon

Norsk Hydro Shuts Plants Amid Ransomware Attack

19-Mar-2019 | Meritalk

Article icon

Ransomware Attack Jolts Massive Aluminum Producer

14-Mar-2019 | Dark Reading

Article icon

Ransomware's New Normal

12-Mar-2019 | CyberScoop

Article icon

UN report links North Korean hackers to theft of $571 million from cryptocurrency exchanges

9-Mar-2019 | Sydney Morning Herald

Article icon

Australia an easy 'testing ground' for hackers: cyber industry chief

7-Mar-2019 | CRN

Article icon

RSA Conference 2019: 10 Execs On Who's The Biggest 'Unsung Hero' For Their Business

7-Mar-2019 | TechTarget

Article icon

Nation-state threats grow more sophisticated, converge on targets

7-Mar-2019 | PC Magazine

Article icon

When Fighting Nation-State Hackers, Move Fast, Experts Warn

7-Mar-2019 | Infosecurity Magazine

Article icon

RSAC: Mastering the Art of Remediation

7-Mar-2019 | SC Magazine

Article icon

The winners of the 2019 SC Awards Honored in the U.S.

7-Mar-2019 | The Economist

Article icon

In the cyber break-in stakes, the champion is Russia

7-Mar-2019 | CNET

Article icon

Hackers can get into Macs with sneaky tricks, Crowdstrike experts say

7-Mar-2019 | Spiegal Online

Article icon

Kim's dotcom

7-Mar-2019 | eSecurity Planet

Article icon

10 Vendors Making Product Announcements at RSA Conference 2019

7-Mar-2019 | Help Net Security

Article icon

CrowdStrike announces EDR solution for mobile devices

7-Mar-2019 | Mobile Payments Today

Article icon

Rise in mobile shopping, banking forcing shifts in endpoint security

7-Mar-2019 | Dark Reading

Article icon

CrowdStrike Debuts Mobile Threat Detection System at RSA Conference

7-Mar-2019 | Security Week

Article icon

CrowdStrike Launches EDR Solution for Mobile Devices

7-Mar-2019 | CRN

Article icon

30 Hot New Cybersecurity Products Announced At RSA Conference 2019

7-Mar-2019 | SC Magazine UK

Article icon

Pinchy Spider goes big game hunting with GandCrab

7-Mar-2019 | ZDNet

Article icon

Ransomware warning: The gang behind this virulent malware just changed tactics again

6-Mar-2019 | Spiegel Online

Article icon

The new network and the fear of espionage

6-Mar-2019 | The Hill

Article icon

Winter (in cyberspace) is coming

6-Mar-2019 | Channel Life AU

Article icon

CrowdStrike announces endpoint detection for mobile devices

5-Mar-2019 | Government Technology

Article icon

Shared Code Creates Opportunity for Hackers, Expert Warns

27-Feb-2019 | CNBC

Article icon

In India-Pakistan conflict, there's a long-simmering online war, and some very good hackers on both sides

27-Feb-2019 | Security Boulevard

Article icon

Can You Stop a Breach in 19 Minutes?

27-Feb-2019 | Dark Reading

Article icon

Persistent Attackers Rarely Use Bespoke Malware

25-Feb-2019 | Security Brief AU

Article icon

Are you sticking to your cybersecurity resolutions this year?

20-Feb-2019 | CNN

Article icon

Chinese hackers are ramping up attacks on US companies

20-Feb-2019 | Forbes

Article icon

Russia's State-Sponsored Hackers Are The World's Fastest

20-Feb-2019 | BBC

Article icon

Global Threat Report

13-Feb-2019 | CSO

Article icon

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

13-Feb-2019 | CRN India

Article icon

CrowdStrike sees supply chain attacks and cyber espionage as top trends

11-Feb-2019 | Four Corners

Article icon

Meet the scammers

8-Feb-2019 | CSO

Article icon

CrowdStrike Store opens its endpoint security agent to other vendors

7-Feb-2019 | Security Brief AU

Article icon

CrowdStrike opens endpoint protection platform to third-party apps

7-Feb-2019 | Channel Buzz

Article icon

CrowdStrike looks to new partner program to expand partner base and aid in market surge

7-Feb-2019 | Digitalisation World

Article icon

CrowdStrike partners with Mercedes-AMG Petronas Motorsports

7-Feb-2019 | Information Age

Article icon

Mercedes-AMG Petronas Motorsport partners with cyber security firm CrowdStrike

7-Feb-2019 | SC Media

Article icon

The rise in attack vectors: How do attackers gain access?

6-Feb-2019 | Intelligent CISO

Article icon

CrowdStrike opens endpoint protection platform to third-party applications

5-Feb-2019 | Security Boulevard

Article icon

CrowdStrike Moves to Create Cybersecurity Ecosystem

1-Feb-2019 | Channel Futures

Article icon

Dell Boots Cylance, Revamps PC Endpoint Protection with CrowdStrike, Secureworks

31-Jan-2019 | TechTarget

Article icon

Dell unveils endpoint security portfolio with CrowdStrike, Secureworks

31-Jan-2019 | Security Week

Article icon

Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering

31-Jan-2019 | Storage Review

Article icon

Dell Partners With Secureworks & CrowdStrike On Endpoint Security

31-Jan-2019 | Dark Reading

Article icon

Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints

31-Jan-2019 | Bleeping Computer

Article icon

Dell Introduces Dell SafeGuard and Response Solutions To Fight Evolving Threats

31-Jan-2019 | CRN

Article icon

Dell, CrowdStrike, SecureWorks Forge Pact To Keep Endpoints Secure

31-Jan-2019 | Express Computer

Article icon

CrowdStrike Will Continue To Accelerate Customer Momentum, Expand International Footprint

31-Jan-2019 | AI Authority

Article icon

CrowdStrike Revamps the Elevate Partner Program to Accelerate Resell Opportunities

30-Jan-2019 | Inside Defense

Article icon

DOD officials pushing for standardized cyberspace systems across department

30-Jan-2019 | BBC

Article icon

Huawei and the Trade War

30-Jan-2019 | Channel Asia

Article icon

CrowdStrike unveils new program tiers for resellers

29-Jan-2019 | Channel Eye

Article icon

Crowdstrike adds a new reseller tier

28-Jan-2019 | MSSP Alert

Article icon

CrowdStrike Endpoint Protection Adds Tiers to Channel Partner Program

28-Jan-2019 | SecurityBrief AU

Article icon

CrowdStrike announces revamped partner programme

28-Jan-2019 | Channel Life AU

Article icon

CrowdStrike announces revamped partner programme

28-Jan-2019 | Channel Pro

Article icon

CrowdStrike gives partner programme a makeover

28-Jan-2019 | Channels Partners

Article icon

CrowdStrike Debuts New Tiered Reseller Program

28-Jan-2019 | CRN

Article icon

CrowdStrike Unveils Tiered Reseller Program With Big Discounts, MDF

28-Jan-2019 | Channelonmics

Article icon

CrowdStrike Adds Tiers, Certs to Partner Program

28-Jan-2019 | CyberScoop

Article icon

North Korea could accelerate commercial espionage to meet Kim's economic deadline

24-Jan-2019 | ExecutiveBiz

Article icon

James Yeager: CrowdStrike Aims to Help Secure Gov’t Networks With Endpoint Protection Tech

16-Jan-2019 | Spiegel Online

Article icon

Criminals blackmail companies with new malicious software

14-Jan-2019 | Help Net Security

Article icon

Criminals wielding Ryuk ransomware specialize in targeting enterprises

14-Jan-2019 | CMO

Article icon

12 ways this CMO is securing the future of a fast-growth B2B brand

14-Jan-2019 | Fifth Domain

Article icon

With China looming, intelligence community backs AI research

14-Jan-2019 | Threatpost

Article icon

Ryuk Hauls in $3.7M in ‘Earnings,’ Adds TrickBot to the Attack Mix

14-Jan-2019 | IT Pro Portal

Article icon

Selective ransomware Ryuk nets $4m from big businesses

14-Jan-2019 | HealthITSecurity

Article icon

Notorious Ryuk Ransomware Adds Trojans to Cyberattack Method

14-Jan-2019 | PYMNTS

Article icon

Hackers Make $3.7M In Ryuk Ransomware Attack

14-Jan-2019 | CSO

Article icon

A look ahead in cyber security, old enemies re-emerge and sophisticated attacks on the rise

13-Jan-2019 | Engadget

Article icon

Ryuk ransomware banks $3.7 million in five months

13-Jan-2019 | SC Magazine

Article icon

Ryuk ransomware linked to Emotet and TrickBot trojans; suspicions shift to cybercriminal group

13-Jan-2019 | Silicon Angle

Article icon

Ryuk ransomware now believed to be the work of Russian crime syndicate

12-Jan-2019 | ArsTechnica

Article icon

New ransomware rakes in $4 million by adopting a “big game hunting” strategy

12-Jan-2019 | ZDNet

Article icon

Ryuk ransomware gang probably Russian, not North Korean

10-Jan-2019 | Dark Reading

Article icon

New Software Side-Channel Attack Raises Risk for Captured Crypto

10-Jan-2019 | CyberScoop

Article icon

Ryuk ransomware shows Russian criminal group is going big or going home

7-Jan-2019 | Dark Reading

Article icon

Bug Bounty Awards Climb as Software Security Improves

7-Jan-2019 | Sky News

Article icon

Data breach in Germany: Police search flat of teenage IT worker

3-Jan-2019 | Infosecurity Magazine

Article icon

Managed Threat Hunting Fills a Critical Gap

31-Dec-2018 | InfoRiskToday

Article icon

Stop the Presses: Don't Rush Tribune Ransomware Attribution

30-Dec-2018 | New York Times

Article icon

Cyberattack Disrupts Printing of Major Newspapers

27-Dec-2018 | Built in Austin

Article icon

New Year, New You: Live your passion at these 5 Austin tech companies in 2019

27-Dec-2018 | SC Magazine

Article icon

Supply and Demand (for security)

27-Dec-2018 | Yahoo Finance

Article icon

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks

27-Dec-2018 | Federal Times

Article icon

What will 2019 bring in federal workforce, IT, legislation and more?

20-Dec-2018 | SC Magazine

Article icon

2019 cyber-security predictions - Pandora's box of ills - but Hope remains

20-Dec-2018 | SC Magazine

Article icon

US and allies accuse China over stealing trade secrets

20-Dec-2018 | CRN

Article icon

U.S. Justice Department Indicts Chinese Hackers For Targeting MSPs

20-Dec-2018 | SC Magazine

Article icon

U.S. indicts Chinese nationals on cyber espionage charges

20-Dec-2018 | Dark Reading

Article icon

US Indicts 2 APT 10 Members for Years-Long Hacking Campaign

20-Dec-2018 | FCW

Article icon

Stone Panda' hackers indicted in campaign that targeted U.S. government networks

20-Dec-2018 | TechCrunch

Article icon

Justice Department accuses Chinese spies of hacking into dozens of US tech and industry giants

20-Dec-2018 | CBR

Article icon

Chinese Hacking Alert: UK, Allies Blame Beijing for Malicious Theft Campaign

20-Dec-2018 | NextGov

Article icon

DOJ Hits Chinese Hackers For Attacking U.S. Navy, Agencies, Companies

18-Dec-2018 | WIRED

Article icon

THE IRAN HACKS CYBERSECURITY EXPERTS FEARED MAY BE HERE

14-Dec-2018 | Digital World

Article icon

Organisations need to improve their attack detection

14-Dec-2018 | ZDNet

Article icon

How one hacked laptop led to an entire network being compromised

12-Dec-2018 | @IT

Article icon

CrowdStrike reveals intrusion survey, alerting the that Organizations are still too Slow to Improve on Attack Detection

12-Dec-2018 | Security Insight

Article icon

CrowdStrike reveals intrusion survey, alerting the that Organizations are still too Slow to Improve on Attack Detection

12-Dec-2018 | Scan Net Security

Article icon

The number of attacks leveraging social engineering, phishing and spear-phishing doubled in 2018, while Web server attacks declined

12-Dec-2018 | Infopoint Security

Article icon

Businesses still recognize cyberattacks too slowly

12-Dec-2018 | Fifth Domain

Article icon

Does IT compliance mean good cybersecurity? Experts disagree.

12-Dec-2018 | CyberScoop

Article icon

Suspected North Korean hackers target universities using Chrome extension

12-Dec-2018 | All-about-security

Article icon

The detection of cyberattacks is still too slow

12-Dec-2018 | ZDNet

Article icon

2019 security threats? Expect Iranian 'kittens' to follow the money

12-Dec-2018 | Reuters

Article icon

Shamoon computer virus variant is lead suspect in hack on oil firm Saipem

12-Dec-2018 | Teiss

Article icon

Big data, graph, and the cloud: 3 keys to stopping today’s threats

12-Dec-2018 | Security Brief AU

Article icon

Businesses too slow on attack detection – CrowdStrike

11-Dec-2018 | Dark Reading

Article icon

CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks

11-Dec-2018 | Axios

Article icon

We're getting better at finding data breaches

11-Dec-2018 | The Hill

Article icon

More cyber criminals seeking to monetize attacks, report finds

11-Dec-2018 | Security Week

Article icon

Organizations Still Slow to Detect Breaches: CrowdStrike

6-Dec-2018 | CyberScoop

Article icon

Suspected North Korean hackers target universities using Chrome extension

4-Dec-2018 | ZDNet

Article icon

Cyber security: Hackers step out of the shadows with bigger, bolder attacks

28-Nov-2018 | Defence Online

Article icon

Cyber Security – understanding the threats

21-Nov-2018 | National Law Review

Article icon

China's Main Security Agency Linked to Cyber Intellectual Property Theft

20-Nov-2018 | Solutions Review

Article icon

The 7 Gartner Peer Insights Customers’ Choice Vendors for Endpoint Security and Protection Software

19-Nov-2018 | The Hill

Article icon

Russian hacking group 'Cozy Bear' likely responsible for phishing campaign, US security firm says

19-Nov-2018 | Bloomberg

Article icon

Hackers Impersonated State Department Spokeswoman, Firms Say

19-Nov-2018 | SC Magazine

Article icon

Cozy Bear tracks: Phishing campaign looks like work of Russian APT group

19-Nov-2018 | The Sydney Morning Herald

Article icon

China uses the cloud to step up spying on Australian business

19-Nov-2018 | AFR

Article icon

Chinese spies responsible for surge in cyber hacking

16-Nov-2018 | Reuters

Article icon

Russians impersonating U.S. State Department aide in hacking campaign: researchers

15-Nov-2018 | Washington Post

Article icon

The Cybersecurity 202

15-Nov-2018 | Politico

Article icon

Morning Cybersecurity

15-Nov-2018 | Politico

Article icon

What’s next for DHS cyber changeup

9-Nov-2018 | CNN

Article icon

US banks prepare for Iranian cyberattacks as retaliation for sanctions

7-Nov-2018 | World Politics Review

Article icon

Despite Diplomatic Détente, North Korea Is Continuing Its Cyberattacks

7-Nov-2018 | Dark Reading

Article icon

20 Cybersecurity Firms to Watch

6-Nov-2018 | Web Summit

Article icon

Setting the standard in cloud security

5-Nov-2018 | CNN

Article icon

I worked for the FBI. The mid-terms could be hacked, but here's the bigger threat

5-Nov-2018 | Bloomberg

Article icon

U.S. Midterm Elections Vulnerable to Cyber Attacks, Experts Fear

4-Nov-2018 | Security Ledger

Article icon

Managed Threat Hunting Bridges the Talent Gap

4-Nov-2018 | eWeek

Article icon

Security Lessons Companies Can Learn From the U.S. Elections

2-Nov-2018 | The New York Times

Article icon

Mystery of the Midterm Elections: Where Are the Russians?

2-Nov-2018 | Washington Post

Article icon

With new indictment, U.S. launches aggressive campaign to thwart China’s economic attacks

1-Nov-2018 | CyberScoop

Article icon

DOJ indictment spotlights China’s civilian intel agency – and its hacker recruits

31-Oct-2018 | Infosecurity Magazine

Article icon

US Indicts Chinese Spies and Insiders for Aviation Theft

27-Oct-2018 | Gizmodo

Article icon

U.S. Indicts Chinese Hacker-Spies in Conspiracy to Steal Aerospace Secrets

27-Oct-2018 | WSJ

Article icon

U.S. Charges Chinese Agents in Hacking Scheme, More Cases Expected

27-Oct-2018 | Forbes

Article icon

How To Prevent Your Business Becoming Collateral Damage Of Geopolitical Cyber Conflict

25-Oct-2018 | ABC

Article icon

In social media 'arms race,' tech giants chase evolving trolls and bots

25-Oct-2018 | SC Magazine

Article icon

‘Narwhal Spider’ group’s spam campaign targets Japanese recipients with URLZone malware

25-Oct-2018 | ExecutiveBiz

Article icon

DHS OKs CrowdStrike Cybersecurity Services Under Continuous Diagnostics & Mitigation Program

17-Oct-2018 | Newsweek

Article icon

U.S.-CHINA NUCLEAR WAR THREAT IS GREATER THAN MOST PEOPLE REALIZE, EXPERT WARNS

17-Oct-2018 | Financial Times

Article icon

Taiwan to share Chinese hacks data with private companies

16-Oct-2018 | The Guardian

Article icon

US-China tensions soar as 'new cold war' heats up

16-Oct-2018 | CRN

Article icon

CRN Channel Chiefs

15-Oct-2018 | Security Brief

Article icon

Exclusive: CrowdStrike’s roundup of threats so far in 2018

9-Oct-2018 | The Telegraph

Article icon

China is ahead of Russia as 'biggest state sponsor of cyber-attacks on the West'

9-Oct-2018 | SC Magazine

Article icon

China leads nation-state sponsored hacktivity rise

9-Oct-2018 | Axios

Article icon

Chinese espionage up, cryptominers getting clever

9-Oct-2018 | SC Magazine

Article icon

China leads nation-state sponsored hacktivity rise

9-Oct-2018 | Bloomberg

Article icon

CrowdStrike CTO Sees Chinese Cyberattacks Increasing

9-Oct-2018 | Dark Reading

Article icon

Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods

9-Oct-2018 | NBC

Article icon

China's hackers are stealing secrets from U.S. firms again, experts say

9-Oct-2018 | The Telegraph

Article icon

China is ahead of Russia as 'biggest state sponsor of cyber-attacks on the West'

9-Oct-2018 | Security Ledger

Article icon

Podcast Episode 115

4-Oct-2018 | Fifth Domain

Article icon

Is the US legal system an effective cyber deterrent?

3-Oct-2018 | AP

Article icon

North Korea has reportedly stolen hundreds of millions of dollars in online bank heists

2-Oct-2018 | SC Magazine

Article icon

You're fired! Does sacking the CISO make good post-breach security sense?

2-Oct-2018 | WSJ

Article icon

Cyberespionage Experts Want to Know Who’s Exposing China’s Hacking Army

28-Sep-2018 | Information Age

Article icon

Crowdstrike CTO on securing the endpoint and responding to a breach

26-Sep-2018 | Information Age

Article icon

Crowdstrike CTO on ‘setting the vision for innovation’

20-Sep-2018 | The Fintech Times

Article icon

CrowdStrike Intelligence finds eCrime Group Shifts Approach to Targeted Attacks

18-Sep-2018 | WSJ

Article icon

How AI Can Help Stop Cyberattacks

18-Sep-2018 | SC Media

Article icon

AI defence versus IoT threat: and the winner is?

18-Sep-2018 | IT Pro Portal

Article icon

Damaged links lead to broken chains: The contentions of securing the supply chain

13-Sep-2018 | CSO

Article icon

Board members and cyber responsibility

13-Sep-2018 | Dark Reading

Article icon

The Increasingly Vulnerable Software Supply Chain

12-Sep-2018 | Law.com

Article icon

Insight Into Cybersecurity Regulations Is Critical for Today’s Board Members

10-Sep-2018 | MarketWatch

Article icon

A year after Equifax, cybersecurity is still seeking its Holy Grail

7-Sep-2018 | DataBreachToday

Article icon

Why Managed Threat Hunting?

7-Sep-2018 | Buzzfeed News

Article icon

The Indictment Of North Korea For The Sony Hack Shows How Cybersecurity Has Evolved

6-Sep-2018 | White and Case

Article icon

Due diligence: Cybersecurity at the portfolio level

6-Sep-2018 | Security Week

Article icon

U.S. Charges North Korean Over Lazarus Group Hacks

6-Sep-2018 | Politico

Article icon

U.S. indicts North Korean national for Sony hack, massive cyberattacks

6-Sep-2018 | Washington Post

Article icon

U.S. charges North Korean operative in conspiracy to hack Sony Pictures, banks

6-Sep-2018 | LinkedIn

Article icon

LinkedIn Top Startups 2018: The 50 most sought-after startups in the U.S.

6-Sep-2018 | CNET

Article icon

Justice Department charges North Korean over WannaCry, Sony hack

3-Sep-2018 | Threatpost

Article icon

APT10 Under Close Scrutiny as Potentially Linked to Chinese Ministry of State Security

3-Sep-2018 | FCW

Article icon

Chinese hacker group targets tech supply chain, report says

31-Aug-2018 | SC Magazine

Article icon

CrowdStrike verifies portions of report linking APT10 activity to Chinese government actors

30-Aug-2018 | Motherboard VICE

Article icon

Meet 'Intrusion Truth,' the Mysterious Group Doxing Chinese Intel Hackers

29-Aug-2018 | Telecompaper

Article icon

CrowdStrike opens Innovation and Development Center in India

29-Aug-2018 | Tech Observer

Article icon

CrowdStrike launches innovation and development centre in Pune

29-Aug-2018 | The Times of India

Article icon

Indian financial data not top notch

24-Aug-2018 | Dark Reading

Article icon

6 Reasons Security Awareness Programs Go Wrong

24-Aug-2018 | CNBC

Article icon

Turkish 'hacktivists' take over social media accounts of U.S. journalists

21-Aug-2018 | Fifith Domain

Article icon

Why you should follow the 1-10-60 rule of cybersecurity

21-Aug-2018 | Dark Reading

Article icon

Open-Source Hybrid Analysis Portal Gets a Boost

21-Aug-2018 | eWeek

Article icon

CrowdStrike Helps Advance Malware Searches On Hybrid Analysis

21-Aug-2018 | Security Week

Article icon

CrowdStrike Adds Malware Search Engine to 'Hybrid Analysis'

21-Aug-2018 | CRN UK

Article icon

CrowdStrike's global channel boss on the vendor's EMEA expansion

20-Aug-2018 | Law.com

Article icon

Paul Shinn Joins Silicon Valley Company CrowdStrike as General Counsel

16-Aug-2018 | The Telegraph

Article icon

Hackers steal £10m from cash machines in global heist

13-Aug-2018 | CSO

Article icon

3 reasons companies fail to assess the scope of a data breach

9-Aug-2018 | Politico

Article icon

Research: Smart cities are dumb on defense

9-Aug-2018 | SC Media

Article icon

Software supply chain attacks: preventing and mitigating "the next ransomware"

8-Aug-2018 | ReadITQuik

Article icon

CrowdStrike Expands the Scope of its Endpoint Protection Platform

8-Aug-2018 | Channel Partners

Article icon

Big Funding Round Helps CrowdStrike Grow Channel Business

8-Aug-2018 | CRN

Article icon

20 Hot Cybersecurity Products Announced At Black Hat 2018

4-Aug-2018 | The Hill

Article icon

Trump officials look to neutralize cyber threats in supply chain

1-Aug-2018 | Forbes

Article icon

Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links

27-Jul-2018 | SecurityWeek

Article icon

Microsoft Uncovers Multi-Tier Supply Chain Attack

27-Jul-2018 | Forbes

Article icon

CrowdStrike Raises $200M To Gain Share From McAfee, Symantec in $35B Market

26-Jul-2018 | Information Age

Article icon

Supply chain attacks are the next big risk for organisations

26-Jul-2018 | CSO

Article icon

“Naïve” Australian companies know supply chains create security problems, but aren’t fixing them

26-Jul-2018 | Money FM

Article icon

Healthcare sector vulnerability

25-Jul-2018 | BBC

Article icon

US warns of supply chain cyber-attacks

25-Jul-2018 | Washington Post

Article icon

Chinese theft continues in cyberspace as new threats emerge, U.S. intelligence officials warn

23-Jul-2018 | SC Magazine UK

Article icon

Hackers increasingly targeting supply chains - few prepared to mitigate risk

23-Jul-2018 | Beta News

Article icon

Software supply chain attacks set to become a major threat

23-Jul-2018 | Digit

Article icon

Emerging Attack Vectors are Putting UK Organisations at Risk

23-Jul-2018 | Infosecurity Magazine

Article icon

Surge in Software Supply Chain Attacks

23-Jul-2018 | HealthITSecurity

Article icon

C-Suite May Lack Awareness of Healthcare Supply Chain Risk

23-Jul-2018 | Supply & Demand Chain Executive

Article icon

Supply Chain Attacks on the Rise, Organizations Struggle to Close Gaps

23-Jul-2018 | Security Week

Article icon

Software Supply Chain Increasingly Targeted in Attacks: Survey

23-Jul-2018 | Security Today

Article icon

Supply Chain Attacks on the Rise as Organizations Struggle to Close the Gaps

23-Jul-2018 | SC Magazine

Article icon

Two-thirds of orgs have suffered supply chain attacks despite defenses

23-Jul-2018 | ITWire

Article icon

Research finds Australian organisations largely unprepared for supply chain attacks

23-Jul-2018 | Politico

Article icon

Morning Cybersecurity

23-Jul-2018 | Dark Reading

Article icon

Two-Thirds of Organizations Hit in Supply-Chain Attacks

23-Jul-2018 | The Australian

Article icon

Setting costs mark for attacks

23-Jul-2018 | Spiegal Online

Article icon

German companies underestimate the risk of software updates

23-Jul-2018 | CRN

Article icon

The 10 Hottest Cybersecurity Products Of 2018

20-Jul-2018 | Dark Reading

Article icon

Why Security Startups Fly – And Why They Crash

20-Jul-2018 | Investor's Business Daily

Article icon

AI Companies Race To Get Upper Hand In Cybersecurity — Before Hackers Do

12-Jul-2018 | Silicon ANGLE

Article icon

Boom times: Venture capital funding hits record highs as AI leads the way

5-Jul-2018 | PC World

Article icon

Keeping ahead of hotel cyber threats

3-Jul-2018 | Alley Watch

Article icon

The 12 Largest US Startup Funding Rounds of June 2018

3-Jul-2018 | Information Week

Article icon

Fundings Provide a Peek into Emerging Tech

2-Jul-2018 | CRN

Article icon

10 Hot Startups That Raised VC Funding In June

2-Jul-2018 | SC Magazine

Article icon

SC Magazine Names CrowdStrike Falcon® a “Best Buy” with Five Stars Across All Categories

1-Jul-2018 | Connected Futures

Article icon

AI and Security: the Arms Race

28-Jun-2018 | Computer Weekly

Article icon

CrowdStrike warranty stirring up endpoint debate

28-Jun-2018 | Channel News Asia

Article icon

Singapore’s perceived openness to blockchain, cryptocurrency tech a cybersecurity risk: CrowdStrike VP

25-Jun-2018 | Inside Security

Article icon

Inside Security (Jun 25th, 2018)

21-Jun-2018 | ZDNet

Article icon

World Cup 2018: The tech security challenges around the big event

21-Jun-2018 | SC Magazine UK

Article icon

Why enterprises invest in next-gen security, and then don't use it

20-Jun-2018 | SC Magazine UK

Article icon

Understanding the supply chain and protecting it from threats

19-Jun-2018 | Security Brief AU

Article icon

CrowdStrike raises a massive $200 million in latest funding round

19-Jun-2018 | Silicon Valley Business Journal

Article icon

Cyber unicorn CrowdStrike's valuation triples to $3B in new funding round

19-Jun-2018 | Dark Reading

Article icon

CrowdStrike Secures $200M Funding Round

19-Jun-2018 | SecurityWeek

Article icon

CrowdStrike Raises $200 Million at $3 Billion Valuation

19-Jun-2018 | CRN

Article icon

CrowdStrike Lands $200M In Funding, Plans To Boost Partner Enablement Efforts

19-Jun-2018 | CyberScoop

Article icon

CrowdStrike valued at $3 billion with new $200 million infusion

19-Jun-2018 | Wall Street Journal

Article icon

CrowdStrike Raises $200 Million

19-Jun-2018 | Fortune

Article icon

Cybersecurity Firm CrowdStrike Raises $200 Million at $3 Billion Private Valuation

19-Jun-2018 | Financial Times

Article icon

CrowdStrike valuation tops $3bn in new fundraising

19-Jun-2018 | TechCrunch

Article icon

Pondering an IPO, cyber security company CrowdStrike raises $200 million at over $3 billion valuation

19-Jun-2018 | Reuters

Article icon

CrowdStrike raises $200 million, continues to evaluate IPO: CEO

19-Jun-2018 | SiliconAngle

Article icon

New $200M round gives cybersecurity startup CrowdStrike a $3B valuation

19-Jun-2018 | VentureBeat

Article icon

Cybersecurity startup CrowdStrike raises $200 million at $3 billion valuation

18-Jun-2018 | TechRepublic

Article icon

Can Russian hackers be stopped? Here's why it might take 20 years

13-Jun-2018 | ABC Australia

Article icon

Not just nukes: what about North Korea’s other weapons?

12-Jun-2018 | WIRED

Article icon

FEDS BUST DOZENS OF EMAIL SCAMMERS, BUT YOUR INBOX STILL ISN’T SAFE

11-Jun-2018 | WIRED UK

Article icon

As the West warns of Chinese cyber spies, poorer nations welcome gifts with open arms

10-Jun-2018 | The Telegraph

Article icon

GDPR could result in higher ransomware demands, experts warn

8-Jun-2018 | CyberScoop

Article icon

Chinese hackers stole sensitive U.S. Navy submarine plans from contractor

7-Jun-2018 | CIO Dive

Article icon

Cybersecurity vendors put money where their mouth is with $1M warranties

6-Jun-2018 | Solutions Review

Article icon

CrowdStrike Offers $1 Million Security Breach Warranty: What Does It Mean?

6-Jun-2018 | ZDNet

Article icon

CrowdStrike customers that suffer data breach can claim up to $1 million in coverage

6-Jun-2018 | CyberScoop

Article icon

CrowdStrike announces $1 million warranty for breaches that happen under its watch

5-Jun-2018 | eWeek

Article icon

Processor Flaws Force Chip Producers to Make Security Top Priority

5-Jun-2018 | CRN

Article icon

CrowdStrike announces $1m cyber protection warranty

5-Jun-2018 | Dark Reading

Article icon

CrowdStrike Launches $1 Million Security Breach Warranty

5-Jun-2018 | CSO

Article icon

Jagdish Mahapatra is Managing Director, Asia, at CrowdStrike

5-Jun-2018 | Infosecurity Magazine

Article icon

Stealthier Attacks are Blurring the Lines Between Cybercrime & Statecraft

31-May-2018 | Axios

Article icon

Codebook - May 31, 2018

23-May-2018 | AIthority

Article icon

Hotels Facing Increased Pressure From Cyber Threats

23-May-2018 | Dark Reading

Article icon

Destructive 'VPNFilter' Attack Network Uncovered

23-May-2018 | Total Retail

Article icon

4 Tips for Better Retail Cyber Security

22-May-2018 | CIO Dive

Article icon

With fears of full-scale cyberwar, questions of attribution arise

18-May-2018 | eWeek

Article icon

CrowdStrike Advances Cyber-Security Automation to Aid Forensics

18-May-2018 | Politico

Article icon

Dems launch bid to undo White House cybersecurity coordinator elimination

7-May-2018 | The Hill

Article icon

Increasingly brazen North Korean hackers growing capable

7-May-2018 | WSJ

Article icon

The morning download

3-May-2018 | Reuters

Article icon

Nigeria's Internet fraudsters zero in on corporate email accounts

3-May-2018 | Channel Life NZ

Article icon

Exclusive Interview: Crowdstrike and its partners - it’s reciprocal

3-May-2018 | WIRED

Article icon

NIGERIAN EMAIL SCAMMERS ARE MORE EFFECTIVE THAN EVER

1-May-2018 | CSO

Article icon

Cloud and Security aren’t chalk and cheese: Andrew Littleproud, CrowdStrike

1-May-2018 | The Australian

Article icon

Australia needs to do more on data protection

30-Apr-2018 | Security Brief NZ

Article icon

Artificial intelligence oversaturation – going beyond the buzzword

26-Apr-2018 | InfoRiskToday

Article icon

Sophisticated Attacks Have Gone Mainstream

23-Apr-2018 | Information Age

Article icon

The success of artificial intelligence depends on data

20-Apr-2018 | Information Week

Article icon

Managing Online Extortion and Other Tricky Relationships

20-Apr-2018 | CRN

Article icon

RSA 2018: 15 Top Executives On The Single Biggest Security-Related Threat Businesses Face Today

20-Apr-2018 | Channel Life AU

Article icon

CrowdStrike’s new integrations further expand partner programme

18-Apr-2018 | SC Media

Article icon

The winners of the 2018 SC Awards Honored in the U.S.

18-Apr-2018 | SecurityWeek

Article icon

Few RSA Conference Exhibitors Implemented DMARC

18-Apr-2018 | CIO Dive

Article icon

Threat hunting 101: Security experts weigh merits of automating an evolving field

17-Apr-2018 | TechTarget

Article icon

FedRAMP security requirements put a premium on automation

17-Apr-2018 | Solutions Review

Article icon

The 2018 RSA Conference (Current) Endpoint Security Reveals

17-Apr-2018 | Security Week

Article icon

CrowdStrike Unveils New Endpoint Protection, Threat Analysis Solutions

17-Apr-2018 | CSO

Article icon

Hottest cybersecurity products at RSA 2018

16-Apr-2018 | Bleeping Computer

Article icon

What To Expect at the RSA 2018 Conference This Week

16-Apr-2018 | Dark Reading

Article icon

CrowdStrike Announces Real Time Response and Real Time Query to Help Organizations Get Back to Business Quickly After a Cyber Attack

16-Apr-2018 | Dark Reading

Article icon

CrowdStrike Announces Launch of Endpoint Protection Complete

16-Apr-2018 | Dark Reading

Article icon

CrowdStrike Introduces New Automated Threat Analysis Solution to Deliver Predictive Security

16-Apr-2018 | TechRepublic

Article icon

CrowdStrike tools help businesses recover quickly after cyberattack, predict next threat

16-Apr-2018 | TechTarget

Article icon

CrowdStrike Falcon® Intelligence takes aim at incident response

13-Apr-2018 | The Hill

Article icon

Defense contractors face more aggressive ransomware attacks

13-Apr-2018 | Entrepreneur

Article icon

I've Gone From Entrepreneur to the Corporate World and Back Again. This Is What It Takes to Lead a Company.

13-Apr-2018 | The Hill

Article icon

Defense contractors face more aggressive ransomware attacks

13-Apr-2018 | Entrepreneur

Article icon

I've Gone From Entrepreneur to the Corporate World and Back Again. This Is What It Takes to Lead a Company.

8-Apr-2018 | Financial Times

Article icon

‘Cryptojackers’ steal PC power to mine digital coins

5-Apr-2018 | CyberScoop

Article icon

With trade war looming, Chinese cyberespionage may return

4-Apr-2018 | AI Authority

Article icon

Interview With Adam Meyers, VP, Intelligence At CrowdStrike

4-Apr-2018 | WIRED

Article icon

THE BILLION-DOLLAR HACKING GROUP BEHIND A STRING OF BIG BREACHES

4-Apr-2018 | SC Media

Article icon

Saks, Lord & Taylor breached, 5 million payment cards likely compromised

4-Apr-2018 | IT News

Article icon

How to detect and prevent crypto mining malware

4-Apr-2018 | IT World

Article icon

How to detect and prevent crypto mining malware

4-Apr-2018 | CSO

Article icon

How to detect and prevent crypto mining malware

4-Apr-2018 | Dark Reading

Article icon

Iran 'the New China' as a Pervasive Nation-State Hacking Threat

4-Apr-2018 | The Hill

Article icon

Overnight Cybersecurity

4-Apr-2018 | The Hill

Article icon

Chinese cyber spies pose challenge for Trump admin

3-Apr-2018 | eWEEK

Article icon

Google Bans Crypto-Currency Mining Extensions From Chrome Store

3-Apr-2018 | eWEEK

Article icon

2Google Bans Crypto-Currency Mining Extensions From Chrome Store

3-Apr-2018 | Security Boulevard

Article icon

2018 Emerging Threats Show New Sophistication in Hackers

30-Mar-2018 | Infosecurity Magazine

Article icon

Preventing the Next Ransomware Attack

29-Mar-2018 | The Hill

Article icon

Hackers ramp up digital currency mining attacks

28-Mar-2018 | Dark Reading

Article icon

Destructive and False Flag Cyberattacks to Escalate

27-Mar-2018 | Security Brief AU

Article icon

Former Veeam A/NZ VP appointed as CrowdStrike APJ sales boss

27-Mar-2018 | ARN

Article icon

Former Veeam A/NZ VP joins CrowdStrike

23-Mar-2018 | SC Media

Article icon

Nine Iranians indicted over alleged state-sponsored hacking of universities, companies and governments

23-Mar-2018 | NextGov

Article icon

The Big Message in the Iranian Cyber Indictments: Deterrence

23-Mar-2018 | The Washington Post

Article icon

Trump administration hits Iranian hacker network with sanctions, indictments in vast global campaign

22-Mar-2018 | Dark Reading

Article icon

Supply Chain Cyberattacks Surged 200% in 2017

22-Mar-2018 | Dark Reading

Article icon

7 Ways to Protect Against Cryptomining Attacks

19-Mar-2018 | Dark Reading

Article icon

Russian APT Compromised Cisco Router in Energy Sector Attacks

15-Mar-2018 | NY Times

Article icon

Cyberattacks Put Russian Fingers on the Switch at Power Plants, U.S. Says

15-Mar-2018 | CSO

Article icon

The Five Stages of Data Breach Grief

15-Mar-2018 | Financial Times

Article icon

More countries are learning from Russia’s cyber tactics

13-Mar-2018 | MeriTalk

Article icon

AI Can Help Battle Bots

13-Mar-2018 | WSJ

Article icon

Companies Are Seeing How Vulnerable They Are to Hacks

7-Mar-2018 | WIRED

Article icon

THE LEAKED NSA SPY TOOL THAT HACKED THE WORLD

6-Mar-2018 | Infosecurity Magazine

Article icon

Nation-State Attacks Grow in Prevalence

6-Mar-2018 | SC Magazine UK

Article icon

Hospitality industry is key infosec battleground

5-Mar-2018 | SC Media

Article icon

The Iranian Cyberthreat

1-Mar-2018 | CSO

Article icon

Corporates on notice as nation-state attackers refine tactics, look beyond political disruption

27-Feb-2018 | Dark Reading

Article icon

Nation-State Hackers Adopt Russian 'Maskirovka' Strategy

26-Feb-2018 | The Hill

Article icon

Overnight Cybersecurity

26-Feb-2018 | Infosecurity Magazine

Article icon

A view of the global threat landscape: Cybercrime and intrusion trends

26-Feb-2018 | Fast Company

Article icon

The Hacker Zoo Breaking Into A Computer Near You

26-Feb-2018 | Security Ledger

Article icon

Episode 85: Supply Chain Attacks and Hacking Diversity with Leon Johnson

26-Feb-2018 | Security Brief

Article icon

CrowdStrike detail rise of state-sponsored attacks in new global threat report

26-Feb-2018 | 9Finance Australia

Article icon

Military-grade hacking techniques are now in the hands of amateurs

26-Feb-2018 | ZDNet

Article icon

Australian universities and NGOs targeted by Iranian and Chinese hackers

26-Feb-2018 | ComputerWorld

Article icon

Nation states driving the cybercrime industry

26-Feb-2018 | ITWire

Article icon

Intruders remain undetected in corporate networks an average of 86 days

26-Feb-2018 | Computer Weekly

Article icon

Cyber criminals catching up with nation state attacks

26-Feb-2018 | ZDNet

Article icon

Ransomware: Get ready for the next wave of destructive cyberattacks

26-Feb-2018 | The Guardian

Article icon

North Korea is a bigger cyber-attack threat than Russia, says expert

26-Feb-2018 | eWeek

Article icon

CrowdStrike Reveals Time to Breakout as Key Cyber-Security Metric

26-Feb-2018 | SecurityWeek

Article icon

Line Between Nation-State, Criminal Hackers Increasingly Blurred: Report

26-Feb-2018 | CNBC

Article icon

Crowdstrike founder and CTO Dmitri Alperovitch speaks about the growing importance of cybersecurity

23-Feb-2018 | BBC

Article icon

Worries Over AI Misuse

22-Feb-2018 | The Guardian

Article icon

Growth of AI could boost cybercrime and security threats, report warns

22-Feb-2018 | CSO

Article icon

The global cyber war is heating up: Why businesses should be worried

20-Feb-2018 | ZDNet

Article icon

Australia needs more cyber in the middle

20-Feb-2018 | NBC

Article icon

Watch out. North Korea keeps getting better at hacking

16-Feb-2018 | IBTimes

Article icon

Cryptocurrency mining surging among cybercriminals

13-Feb-2018 | Solutions Review

Article icon

World Governments Victims of Global Cryptocurrency Mining Wave

13-Feb-2018 | Silicon UK

Article icon

Researchers Identify Malware That Disrupted Pyeongchang Olympics Launch

13-Feb-2018 | IBTimes

Article icon

What is Olympic Destroyer? Malicious file-wiping malware hits Pyeongchang to embarrass organisers

12-Feb-2018 | Forbes

Article icon

This 'Olympic Destroyer' Malware May Have Killed Winter Games Computers -- UPDATED

12-Feb-2018 | SC Media

Article icon

2018 Winter Olympic Games hit with destroyer malware during opening ceremony

12-Feb-2018 | Solutions Review

Article icon

5 Questions on Cryptomining Answered with Bryan York of CrowdStrike

12-Feb-2018 | TechCrunch

Article icon

Cryptocurrency-mining malware put UK and US government machines to work

12-Feb-2018 | BuzzFeed

Article icon

As The Olympics Deal With A Cyberattack, All Eyes Are On Russia

12-Feb-2018 | New York Times

Article icon

Cyberattack Caused Olympic Opening Ceremony Disruption

12-Feb-2018 | The Hill

Article icon

Cyber experts identify destructive malware used against Olympics

12-Feb-2018 | SC Media

Article icon

Russian actors mentioned as possibly launching Olympics cyberattack

12-Feb-2018 | Dark Reading

Article icon

Cyberattack Aimed to Disrupt Opening of Winter Olympics

12-Feb-2018 | The Hill

Article icon

Overnight Cybersecurity

12-Feb-2018 | Axios

Article icon

What we know about the Olympic malware attack

9-Feb-2018 | CSO

Article icon

Demand surging, CrowdStrike doubles down on APAC investment as endpoint rivals circle

8-Feb-2018 | ARN

Article icon

CrowdStrike ramps up local channel team and investment

7-Feb-2018 | Channel Life AU

Article icon

CrowdStrike to triple investment in APJ channel due to local growth

7-Feb-2018 | ITWire

Article icon

CrowdStrike positioned as leading visionary endpoint security platform

7-Feb-2018 | ITWire

Article icon

CrowdStrike expands partner footprint in APJ following sustained customer demand

6-Feb-2018 | Fast Company

Article icon

New Mission For North Korea's Hackers: Get Rich

1-Feb-2018 | CSO

Article icon

New cryptocurrencies offer better anonymity, new security challenges

1-Feb-2018 | CNET

Article icon

Want easy-to-set-up gadget security? It's not going to be cheap

1-Feb-2018 | Risk Management Magazine

Article icon

2018 Cyberrisk Landscape

1-Feb-2018 | Dark Reading

Article icon

Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises

31-Jan-2018 | Dark Reading

Article icon

Lazarus Group, Fancy Bear Most Active Threat Groups in 2017

30-Jan-2018 | Motherboard VICE

Article icon

Cryptocurrency Mining Malware That Uses an NSA Exploit Is On the Rise

29-Jan-2018 | SC Media

Article icon

Google's DoubleClick network exploited to serve cryptominers

28-Jan-2018 | The CyberWire

Article icon

The week that was. Sunday, January 28, 2018

26-Jan-2018 | Solutions Review

Article icon

Gartner's 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What's Changed?

26-Jan-2018 | The CyberWire

Article icon

The daily briefing. Friday, January 26, 2018

25-Jan-2018 | SC Media

Article icon

Cryptominers halting businesses in 'smash and grab attacks'

22-Jan-2018 | Dark Reading

Article icon

Satori Botnet Malware Now Can Infect Even More IoT Devices

18-Jan-2018 | The Hill

Article icon

Russian hackers move to new political targets

18-Jan-2018 | Solutions Review

Article icon

Living with a Ghost: The Fallout of Meltdown and Spectre

18-Jan-2018 | The Hill

Article icon

Overnight Cybersecurity

16-Jan-2018 | Forbes

Article icon

An Ounce of Prevention - How CrowdStrike Fits Into A Balanced Cybersecurity Portfolio

4-Jan-2018 | CNN

Article icon

The computer chip debacle: Businesses are scrambling

19-Dec-2017 | Dark Reading

Article icon

Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence

19-Dec-2017 | Washington Post

Article icon

U.S. declares North Korea carried out massive WannaCry cyberattack

19-Dec-2017 | CNBC

Article icon

Cybersecurity CEO: 'Absolutely' reason to believe North Korea is amassing bitcoin, likely to fund cyberattacks

18-Dec-2017 | WSJ

Article icon

Why We Have to Really Worry About the Banks' Cybersecurity

15-Dec-2017 | Inc.

Article icon

Unlike IBM, This Company Figured Out How to Make Working from Home Happy and Productive for Everyone

11-Dec-2017 | SC Magazine

Article icon

Malware-free attacks on the rise as line between cybercrime and nation states blurs

11-Dec-2017 | CSO

Article icon

Severe cybersecurity attacks need stronger response plans, 9/11 investigator warns

8-Dec-2017 | Security Week

Article icon

Organizations Getting Better at Detecting Breaches: Report

6-Dec-2017 | CSO

Article icon

What is a botnet? And why they aren't going away anytime soon

6-Dec-2017 | Computer Weekly

Article icon

Lines blurring between state-sponsored and criminal cyber attacks

6-Dec-2017 | Ars Technica

Article icon

"Malware-free" attacks mount in big breaches, CrowdStrike finds

5-Dec-2017 | Forbes

Article icon

60 Cybersecurity Predictions For 2018

5-Dec-2017 | Security Brief AZ

Article icon

Four steps for preventing the next ransomware attack

5-Dec-2017 | CSO

Article icon

What is a supply chain attack? Why you should be wary of third-party providers

3-Dec-2017 | Security Brief Asia

Article icon

Four steps for preventing the next ransomware attack

29-Nov-2017 | SC Magazine

Article icon

Chinese nationals affiliated with Boyusec indicted

29-Nov-2017 | IT Pro Portal

Article icon

A Q&A with Mike Sentonas, CrowdStrike's VP of Technology Stragedy

27-Nov-2017 | Fast Company

Article icon

DOJ indicts three Chinese nationals over hacks on Siemens, Moody's, and Trimble

27-Nov-2017 | Reuters

Article icon

Siemens, Trimble, Moody's breached by Chinese hackers, U.S. charges

27-Nov-2017 | Forbes

Article icon

Chinese Trio Linked To Dangerous APT3 Hackers Charged With Stealing 407GB Of Data From Siemens

27-Nov-2017 | WSJ

Article icon

U.S. Indicts Three Chinese for Alleged Cyberattacks on Moody's, Siemens

26-Nov-2017 | Forbes

Article icon

60 Cybersecurity Predictions For 2018

24-Nov-2017 | Information Age

Article icon

6 month countdown until GDPR sparks 2018 predictions

21-Nov-2017 | Buzzfeed

Article icon

Let The Puns Begin: "Winter Has Come" To The Iranian Who Pirated HBO's Game Of Thrones

21-Nov-2017 | Forbes

Article icon

Feds Say This Iranian Hacker Tried To Extort HBO For $6 Million -- Here's What We Know About Him

19-Nov-2017 | Security Ledger

Article icon

North Korea's widening Net, pricing the Equifax Hack & Dark Markets in Turmoil

8-Nov-2017 | eWeek

Article icon

CrowdStrike Falcon® Shines Spotlight on Vulnerability Management

7-Nov-2017 | TechTarget

Article icon

CrowdStrike outlines expansion plans in APAC

7-Nov-2017 | IT Security Guru

Article icon

Can you prevent the mega breach?

1-Nov-2017 | CNBC

Article icon

These are the 25 most attractive start-ups to work for, according to LinkedIn

1-Nov-2017 | LinkedIn

Article icon

Startups: The 50 industry disruptors you need to know now

31-Oct-2017 | Reuters

Article icon

Banks fearing North Korea hacking prepare defenses: cyber experts

31-Oct-2017 | Reuters

Article icon

Banks fearing North Korea hacking prepare defenses: cyber experts

25-Oct-2017 | ZDNet

Article icon

Bad Rabbit: Ten things you need to know about the latest ransomware outbreak

25-Oct-2017 | Dark Reading

Article icon

Bad Rabbit' Ransomware Attacks Rock Russia, Ukraine - and Beyond

24-Oct-2017 | IBTimes

Article icon

What Is Bad Rabbit? Petya-Style Ransomware Attack Hits Russia, Ukraine

19-Oct-2017 | Dark Reading

Article icon

New Locky Ransomware Strain Emerges

19-Oct-2017 | CSO

Article icon

How AI can help you stay ahead of cybersecurity threats

19-Oct-2017 | Bloomberg

Article icon

Cybercrime Risks Need to be Hunted For And Prevented

18-Oct-2017 | Fortune

Article icon

BEST SMALL & MEDIUM COMPANIES

29-Sep-2017 | CBR

Article icon

Crowdstrike CTO: Theft and destruction are 'just a few keystrokes' apart

15-Sep-2017 | SC Magazine

Article icon

SC Media Reboot Leadership Influencer Award 2017

10-Sep-2017 | The Strait Times

Article icon

In Good Company: CrowdStrike's George Kurtz is in a race against hackers

6-Sep-2017 | WIRED

Article icon

HACKERS GAIN DIRECT ACCESS TO US POWER GRID CONTROLS

6-Sep-2017 | Fortune

Article icon

Hackers Have Penetrated Energy Grid, Symantec Warns

6-Sep-2017 | BBC

Article icon

The hidden history of cyber-crime forums

5-Sep-2017 | SC Magazine

Article icon

Cyber Talk: What You Don't Know Will Hurt You

15-Aug-2017 | NBC

Article icon

U.S. Worried North Korea Will Unleash Cyberattacks

15-Aug-2017 | NBC

Article icon

U.S. Worried North Korea Will Unleash Cyberattacks

14-Aug-2017 | The Australian

Article icon

HBO hack continues ransomware extortion trend

14-Aug-2017 | The Australian

Article icon

HBO hack continues ransomware extortion trend

7-Aug-2017 | Security Brief AU

Article icon

The new tenets of effective threat protection

28-Jul-2017 | eWeek

Article icon

Vendors Use Black Hat Event to Launch New Products, Announce Advances

25-Jul-2017 | ZDNet

Article icon

CrowdStrike launches Falcon MalQuery cybersecurity engine capabilities

25-Jul-2017 | ZDNet

Article icon

CrowdStrike launches Falcon MalQuery cybersecurity engine capabilities

15-Jul-2017 | ABC Australia

Article icon

Australian companies under 'constant' cyber attack, says security company Crowdstrike

11-Jul-2017 | Forbes

Article icon

CrowdStrike Helped Trace The DNC Hack To Russia -- Now Business Is Booming

10-Jul-2017 | CRN

Article icon

Crowdstrike Names Former AppDynamics VP Polly As Global Channel Chief

5-Jul-2017 | Network World

Article icon

10 cutting-edge tools that take endpoint security to a new level

28-Jun-2017 | Financial Times

Article icon

Who is behind the latest cyber attack?

27-Jun-2017 | NPR

Article icon

Cyber Attacks Spread Across Europe Using Stolen NSA Tool

19-May-2017 | BBC

Article icon

WannaCry: What can you do to protect your business?

17-May-2017 | Fortune

Article icon

Hack Investigator CrowdStrike Reaches $1 Billion Valuation

17-May-2017 | CRN

Article icon

Crowdstrike Lands $100M Funding Round, Looks To Expand Globally And Invest In Partners

17-May-2017 | Bloomberg

Article icon

CrowdStrike Raises $100 Million as Cyber Makes Headlines

5-May-2017 | CSO

Article icon

Third parties leave your network open to attacks

2-May-2017 | CBR

Article icon

Machine learning in cyber security: The first line of defense against modern threats

27-Apr-2017 | Dark Reading

Article icon

Iranian Hackers Believed Behind Massive Attacks on Israeli Targets

14-Mar-2017 | TechTarget

Article icon

Is the antivirus industry dead? Experts weigh in

5-Mar-2017 | WIRED

Article icon

Hunting the DNC hackers: how Crowdstrike found proof Russia hacked the Democrats

13-Feb-2017 | eWeek

Article icon

CrowdStrike Revamps Falcon Security Platform to Replace Legacy AV

24-Jan-2017 | Dark Reading

Article icon

4 Reasons Why You Should Take Ransomware Seriously

13-Dec-2016 | New York Times

Article icon

The Perfect Weapon: How Russian Cyberpower Invaded the U.S.

1-Dec-2016 | eWeek

Article icon

Shamoon Malware Returns in New Attacks

3-Nov-2016 | Tech Crunch

Article icon

The ransomware dilemma

24-Oct-2016 | Esquire

Article icon

THE RUSSIAN EXPAT LEADING THE FIGHT TO PROTECT AMERICA

3-Oct-2016 | CSO

Article icon

Data leaks evolving into weapons of business destruction

2-Sep-2016 | Inc.

Article icon

When Wall Street and Washington Get Hacked, They Call This Guy

17-Jun-2016 | Time

Article icon

Why It Matters Who Hacked the Democratic National Committee

7-Mar-2016 | TechCrunch

Article icon

Fear and loathing at RSA: Hacking, security and the limits of protection

7-Mar-2016 | CRN

Article icon

2016 Security 100: 20 Coolest Endpoint Security Vendors

5-Feb-2016 | SecurityWeek

Article icon

CrowdStrike Recaps 2015 Threat Landscape

5-Feb-2016 | CSO

Article icon

China vs. the machine (learning)

18-Jan-2016 | Wall Street Journal

Article icon

How to Improve Cybersecurity? Just Eliminate the Human Factor

5-Jan-2016 | InfoSecurity Magazine

Article icon

Nation-State activity to define cybersecurity in 2016

11-Dec-2015 | CIO

Article icon

Cybersecurity startup hires CIO to accelerate growth

19-Oct-2015 | Wall Street Journal

Article icon

Report Warns of Chinese Hacking

19-Oct-2015 | NYT

Article icon

Cybersecurity Firm Says Chinese Hackers Keep Attacking U.S. Companies

23-Sep-2015 | USA Today

Article icon

China: On cybersecurity, U.S. must not rock the boat

14-Jul-2015 | Slate

Article icon

Report: China Is Making a Huge Database of Americans, and No One Connected the Dots

13-Jul-2015 | TechCrunch

Article icon

Security Company CrowdStrike Scores $100M Led By Google Capital

9-Jul-2015 | Wall Street Journal

Article icon

OPM Ratchets Up Estimate of Hack's Scope

3-Jul-2015 | Reuters

Article icon

Cybersecurity firm CrowdStrike raises $100 mln in funding round

About
CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

CROWDSTRIKE MEDIA RELATIONS
Email: press@crowdstrike.com

Only inquiries for the media will be responded to.

For sales inquiries or partnership opportunities, please email sales@crowdstrike.com