CrowdStrike

Sunnyvale, CA, USA
2011
Jun 23, 2022   |  By Patrick Bennett
CrowdStrike Services recently investigated a suspected ransomware intrusion attempt. The intrusion was quickly stopped through the customer’s efforts and those of the CrowdStrike Falcon Complete™ managed detection and response (MDR) team, which was supporting this customer’s environment.
Recent research from CyberArk Labs presents a new technique for extracting sensitive data from the Chromium browser’s memory. However, existing access to the targeted system is required before leveraging the technique to extract the sensitive data. The technique could enable identity-based attacks involving authentication bypass using Oauth cookies that have already passed an MFA challenge.
Jun 8, 2022   |  By James Perry - Tim Parisi
When a breach occurs, time is of the essence. The decisions you make about whom to collaborate with and how to respond will determine how much impact the incident is going to have on your business operations.
In August 2021, ZDI announced Pwn2Own Austin 2021, a security contest focusing on phones, printers, NAS devices and smart speakers, among other things. The Pwn2Own contest encourages security researchers to demonstrate remote zero-day exploits against a list of specified devices. If successful, the researchers are rewarded with a cash prize, and the leveraged vulnerabilities are responsibly disclosed to the respective vendors so they can improve the security of their products.
Jun 6, 2022   |  By CrowdStrike
CrowdStrike Asset Graph provides unprecedented visibility of assets in an IT environment to optimize cyber defense strategies and manage risk.
Jun 6, 2022   |  By CrowdStrike
New CrowdXDR Alliance partners include Menlo Security, Ping Identity and Vectra AI. New Falcon XDR capabilities include native integration with Falcon Fusion SOAR workflows to streamline and simplify security operations.
Jun 6, 2022   |  By CrowdStrike
Humio for Falcon provides long-term, cost-effective data retention with powerful index-free search and analysis of enriched security telemetry across enterprise environments.
Jun 6, 2022   |  By George Kurtz
The theme of RSA Conference 2022 succinctly captures the aftermath of the disruption we’ve all experienced over the last couple of years: Transform. Customers continue to transform and accelerate digital initiatives in response to the massive economic and technological shifts driven by the COVID-19 pandemic.
Jun 3, 2022   |  By Manoj Ahuje
The software supply chain remains a weak link for an attacker to exploit and gain access to an organization. According to a report in 2021, supply chain attacks increased by 650%, and some of the attacks have received a lot of limelight, such as SUNBURST in 2020 and Dependency Confusion in 2021.
CVE-2022-30190, aka Follina, was published by @nao_sec on Twitter on May 27, 2022 — the start of Memorial Day weekend in the U.S. — highlighting once again the need for round-the-clock cybersecurity coverage. Threat hunting in particular is critical in these instances, as it provides organizations with the surge support needed to combat adversaries and thwart their objectives.
Jun 21, 2022   |  By CrowdStrike
Learn more about why endpoint detection and response (EDR) is foundational for successful extended detection and response (XDR).
Jun 2, 2022   |  By CrowdStrike
In this demo we'll see the Falcon Platform identify systems vulnerable to Follina in your organization, prevent an attack of this vulnerability and show threat hunting capabilities to identify any systems that may have been targeted.
Jun 1, 2022   |  By CrowdStrike
Falcon for Mobile expands EDR capabilities beyond the desktop by monitoring and recording activities taking place on mobile devices. By expanding coverage to include mobile, companies gain visibility necessary to detect attackers from other vectors and prevent malicious insider activity, all while stopping breaches. In this video, we'll show how Falcon for Mobile can protect mobile users.
Jun 1, 2022   |  By CrowdStrike
In this demo, we will see an overview of how CrowdStrike's Falcon Cloud Workload Protection helps organizations identify, manage and secure cloud workloads.
May 4, 2022   |  By CrowdStrike
With the growth of cloud, and the need for speed and agility in today’s digital business, you need a solution that goes beyond simply detecting threats, leaving you with all the work. Powered by holistic intelligence, CrowdStrike Cloud Security delivers great visibility, CI/CD security, and the industry's fastest threat detection and response to outsmart the adversary.
Apr 15, 2022   |  By CrowdStrike
Falcon XDR: extend detection and response beyond the endpoint. Every insight. One response. crowdstrike.com/falconxdr
Apr 15, 2022   |  By CrowdStrike
Falcon XDR: extend detection and response beyond the endpoint. Every insight. One response. crowdstrike.com/falconxdr
Apr 15, 2022   |  By CrowdStrike
Falcon XDR: extend detection and response beyond the endpoint. Every insight. One response. crowdstrike.com/falconxdr
Apr 14, 2022   |  By CrowdStrike
Security teams want to work smarter, not harder. Extended detection and response (XDR) brings together disjointed products, data and processes to deliver the holistic visibility and context security teams need to hunt threats and stop breaches.
Apr 7, 2022   |  By CrowdStrike
While Falcon Horizon provides configuration and behavioral policies to monitor public cloud deployments, customers are not limited to those predefined policies. This video will demonstrate the creation of custom policies within CrowdStrike’s Cloud Security Posture Management solution.
Dec 20, 2021   |  By CrowdStrike
Visibility in the cloud is an important but difficult problem to tackle. It differs among cloud providers, and each one has its own positive and negative aspects. This guide covers some of the logging and visibility options that Amazon Web Services (AWS) and Google Cloud Platform (GCP) offer, and highlights their blind spots and how to eliminate them.
Dec 20, 2021   |  By CrowdStrike
Since a majority of the breaches are credential based, securing your multi-directory identity store - Microsoft Active Directory (AD) and Azure AD - is critical to protecting your organization from adversaries launching ransomware and supply chain attacks. Your security and IAM teams are concerned about securing AD and maintaining AD hygiene - and they need to be in sync, for example, to ensure that legacy and deprecated protocols like NTLMv1 are not being used and that the right security controls are in place to prevent breaches in real time.
Dec 1, 2021   |  By CrowdStrike
You have to secure your workforce identities immediately, to protect your organization from modern attacks like ransomware and supply chain threats. Your environment could be just Microsoft Active Directory (AD), or a hybrid identity store with AD and Azure AD, and it's important to have a holistic view of the directories and a frictionless approach to securing them. If you're considering Microsoft to secure your identities and identity store (AD and Azure Active Directory), you should ask these five questions.
Dec 1, 2021   |  By CrowdStrike
Learn about how to strengthen and modernize your agency's security protection, detection and remediation with Zero Trust. This white paper explains the unique risk factors federal agencies face, what a superior Zero Trust framework includes, and how cloud and endpoint security can help modernize federal security from the endpoint to the application.
Nov 1, 2021   |  By CrowdStrike
Cloud adoption remains a key driver for digital transformation and growth for today's businesses, helping them deliver applications and services to customers with the speed and scalability that only the cloud can provide. Enabling them to do so safely is a critical objective for any enterprise IT security team.
Nov 1, 2021   |  By CrowdStrike
Network segmentation has been around for a while and is one of the core elements in the NIST SP 800-207 Zero Trust framework. Although network segmentation reduces the attack surface, this strategy does not protect against adversary techniques and tactics in the identity phases in the kill chain. The method of segmentation that provides the most risk reduction, at reduced cost and operational complexity, is identity segmentation.

CrowdStrike protects the people, processes and technologies that drive modern enterprise. A single agent solution to stop breaches, ransomware, and cyber attacks—powered by world-class security expertise and deep industry experience.

Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

A Radical New Approach Proven To Stop Breaches:

  • Cloud Native: Eliminates complexity and simplifies deployment to drive down operational costs.
  • AI Powered: Harnesses the power of big data and artificial intelligence to empower your team with instant visibility.
  • Single Agent: Delivers everything you need to stop breaches — providing maximum effectiveness on day one.

One platform. Every industry. Superior protection.