Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Under the Wing: The Risks of Microsoft Security

Cyber risk starts with your choice of security provider. Your security investment is one of the most CRITICAL business decisions you can make. You may have heard that Microsoft offers endpoint security as a built-in feature of their products. But if your security is “free” - you’re getting what you pay for. In our latest episode of Under the Wing, join Mark as he dives deeper into some of the risks of using Microsoft security products and 5 reasons why CrowdStrike customers never have to compromise on security.

CrowdStrike Takes On Spyboy's "Terminator"

On May 21, 2023, a new threat actor named Spyboy emerged, advertising a tool known as “Terminator” in a Russian-language forum, claiming the software could bypass over 20 common AV and EDR controls. CrowdStrike automatically blocked this executable, categorizing this as a high-severity detection, enabled by our AI-powered indicators of attack.

Simple. Fast. Easy. How Deployments Should be.

Getting started with new security tools can be a huge headache for organizations. Think about your last implemented security solution — how long did it take to make sure your business was 100% onboarded with maximum confidence? In this episode, we’ll show you how CrowdStrike enables you to onboard thousands of endpoints in minutes with full peace of mind.

MXDR Demo: Eradicating Multi-Vector Fileless Malware Attack in Minutes

CrowdStrike Falcon Complete XDR is the world’s first managed extended detection and response (MXDR) service with end-to-end remediation, from the #1 MDR leader. In this video, we demonstrate how the Falcon Complete XDR service team identifies, triages, and fully-remediates the cross-domain XDR threat activity associated with an advanced, file-less malware attack as the adversary attempts to persist and exfiltrate from servers in the customer’s environment.

Under the Wing: Protecting Small Businesses Against Big Attacks

70% of all cyberattacks target small to midsize businesses. Adversaries know that most small businesses don’t have the time, tools or staff to go head to head against today’s threats. In this episode, learn how fast, simple and affordable it can be to protect your business.

Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.

Securing private applications with CrowdStrike and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.