CrowdStrike, Inc. is an American cybersecurity technology company based in Sunnyvale, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries. The company has been involved in response efforts to several high-profile cyber-attacks, including the Sony Pictures hack, the 2016 Democratic National Committee email leak, and the Democratic National Committee cyber attacks. In the last case it concluded Russian state actors were responsible.

Wikipedia
CrowdStrike
CrowdStrike
Blog Post
  • Click here for larger image The Spectre-Meltdown CPU design flaws continue to make news. CrowdStrike® security expert Alex Ionescu addressed these flaws in a recent blog, explaining that Spectre-Meltdown actually represents three separate vulnerabilities. Ionescu goes on to outline actions… The post CrowdStrike Provides Spectre-Meltdown Dashboard to Help Customers Mitigate CPU Flaws appeared first...

CrowdStrike
CrowdStrike
Blog Post
  • The much-anticipated CrowdStrike® Cyber Intrusion Services Casebook for 2017 offers detailed accounts of some of the cases the CrowdStrike Services incident response (IR) team has investigated over the past year. One key trend the CrowdStrike team observed is that the… The post IR Team Investigations Uncover eCrime Use of Nation-State Attack Methods appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • The latest computer flaws to make global headlines are ominously titled “Spectre” and “Meltdown” and they represent a unique breed of trouble, requiring unprecedented industry collaboration and manual remediation steps to fully mitigate. Unlike traditional software vulnerabilities that organizations usually… The post Chip Flaws Spectre and Meltdown are Actually Three Vulnerabilities and Proving Ha...

CrowdStrike
CrowdStrike
Blog Post
  • A malicious campaign has been identified targeting suspected victims involved in or supporting the February 2018 Olympic Winter Games in Pyeongchang, South Korea. Open source reporting indicates this campaign used several sophisticated techniques, such as an in-memory implant using PowerShell… The post Malicious Spear-Phishing Campaign Targets Upcoming Winter Olympics in South Korea appeared first...

CrowdStrike
CrowdStrike
Blog Post
  • A recent report from IT research and analysis firm Gartner offers new insights and perspective on the current state of endpoint security. In its report,  titled “Redefining Endpoint Protection for 2017 and 2018,” CrowdStrike asserts that Gartner’s revised definition of… The post New Gartner Report Redefines Endpoint Protection for 2018 appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • This video features IT professionals from the Wyoming Department of Enterprise Technology Services (ETS) discussing their experiences with the CrowdStrike® Falcon® platform. ETS is responsible for supporting and maintaining computer services across the executive branch of the Wyoming state government,… The post Wyoming State Government Protects Against Cyberattacks With the CrowdStrike Falcon Plat...

CrowdStrike
CrowdStrike
Blog Post
  • This video, “Meeting Public Sector Security Challenges: 2018 and Beyond,” touches on some major cybersecurity challenges public sector enterprises will face in the coming months and explains why CrowdStrike® is uniquely positioned to help them mount an effective defense. As… The post 2018 Outlook: Public Sector Enterprises Should Prepare for Increasingly Sophisticated Cyberattacks [VIDEO] appeared...

CrowdStrike
CrowdStrike
Blog Post
  • This video features IT professionals from the Wyoming Department of Enterprise Technology Services (ETS) discussing their experiences with the CrowdStrike® Falcon® platform. ETS is responsible for supporting and maintaining computer services across the executive branch of the Wyoming state government,… The post Wyoming State Government Protects Against Cyberattacks With the CrowdStrike Falcon Plat...

CrowdStrike
CrowdStrike
Blog Post
  •   Overview Recently, CrowdStrike® analyzed the backdoor embedded in the legitimate PC cleaning utility CCleaner version 5.33, as reported in the blog post Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor. This was an example of using… The post CCleaner Stage 2: In-Depth Analysis of the Payload appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • The Most Dangerous Time of The Year The Holidays are upon us, a time where the nights get colder, food gets heavier, and wallets get lighter. The end of the year is typically a time of reflection, community and trust,… The post You’re on Hackers’ Holiday Wishlist — Have You Checked Your Security Twice? appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • In late October and early November, 2017, CrowdStrike® Falcon Intelligence™ observed People’s Republic of China (PRC)-based actors conducting espionage-driven targeted attacks against at least four Western think tanks and an additional two non-governmental organizations (NGOs). This marks a significant increase… The post An End to “Smash-and-Grab” and a Move to More Targeted Approaches appeared fi...

CrowdStrike
CrowdStrike
Blog Post
  • Increasing use of nation-state tactics and tools poses a growing threat for companies that must be ready to respond to critical damage. This article by David Braue, is based on an interview with CrowdStrike Services President and Chief Security Officer… The post Severe Cybersecurity Attacks Need Stronger Response Plans, 9/11 Investigator Warns appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • If there’s one term that vendors love to attach to their security solutions, it’s “next-gen.” This is especially true for endpoint security products, which are routinely marketed as next-gen, or simply as “game-changers.” Some of these vendors may feel their… The post The 6 Requirements of True Next-Gen Endpoint Protection appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • Cyberattacks — and the resulting breaches — are a fact of life now. The impact left in the wake of a successful intrusion can be massive when customer data or other confidential information is stolen, exposed, changed, or deleted. It’s… The post Cyber Intrusion Service Casebook Offers Real-World Investigations into Today’s Most Damaging Cyberattacks appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • Cyberattacks — and the resulting breaches — are a fact of life now. The impact left in the wake of a successful intrusion can be massive when customer data or other confidential information is stolen, exposed, changed, or deleted. It’s… The post Cyber Intrusion Service Casebook Offers Real-World Investigations into Today’s Most Damaging Cyberattacks appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • As his Ted Talk biography states, “When Clifford Stoll speaks, you can’t help but listen.” This video of his keynote address at the recent CrowdStrike Fal.Con Unite 2017 cybersecurity conference proves how true that assessment is. His rousing presentation captivated… The post Renowned Author and Cybersecurity Pioneer Clifford Stoll Mesmerizes at Fal.Con [VIDEO] appeared first on .

CrowdStrike
CrowdStrike
YouTube Video
  • Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of "The Cuckoo's Egg," brings down the house with his mesmerizing keynote at CrowdStrike's first Fal.Con Unite Conference held in November 2017. He discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf of the KGB. Learn how cybersecurity began from...

CrowdStrike
CrowdStrike
Blog Post
  • In this video, CrowdStrike® CTO and Co-Founder Dmitri Alperovitch shares his insights and offers valuable career advice to budding infosecurity professionals. Learn why Alperovitch believes cybersecurity careers must be treated as more than simply a job, and why it’s imperative… The post CrowdStrike CTO Offers Insights on Pursuing an Infosecurity Career [VIDEO] appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • Overview This post continues the technical analysis of the BadRabbit ransomware attacks discussed in Part One of this two-part series. Part One described how BadRabbit uses MS17-010 to both leak a transaction data structure, and to take control of two… The post BadRabbit MS17-010 Exploitation Part Two: Elevate Privileges appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • Overview On October 23, 2017, CrowdStrike® became aware of a new type of ransomware called BadRabbit. The initial infection occurred via a drive-by download masquerading as an Adobe Flash update. Once downloaded, the malware required user interaction in order to… The post BadRabbit MS17-010 Exploitation Part One: Leak and Control appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  •   Overview Recently, CrowdStrike® analyzed the backdoor embedded in the legitimate PC cleaning utility CCleaner version 5.33, as reported in the blog post Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor. This was an example of using… The post In-Depth Analysis of the CCleaner Backdoor Stage 2 Dropper and Its Payload appeared first on .

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.