• Home
  • Categories
    • The Adversary Line-up
    • The Bottom Line
    • The Falcon’s Nest
    • The Front Lines
    • The Lab
    • The Tool Box
  • About Us
  • Contributors
  • Contact Us
  • Crowdstrike.com
Connect With Us

New Era of Cyber Attacks – Know Thy Adversary

New Era of Cyber Attacks – Know Thy Adversary

The Adversary Line-up / The Bottom Line 23 Dec 2014 Dmitri Alperovitch
In February 2014 at the RSA Conference, my colleague George Kurtz and I presented a session titled “Hacking Exposed: Day of Destruction.” We walked through a historical timeline of destructive…
Read More

Maximizing Network Threat Intel with Bro

The Front Lines / Uncategorized Josh Liburdi
There are multiple ways to use threat intelligence to monitor networks for suspicious activity -- our Falcon Host platform does it by integrating with Falcon Intelligence, and many other tools…
Read More

Unprecedented Announcement by FBI Implicates North Korea in Destructive Attacks

The Adversary Line-up / The Front Lines 19 Dec 2014 Dmitri Alperovitch
There is a curse that is purported to translate to an old Chinese Proverb - “May you live in interesting times.” These past few weeks have certainly been that. Today…
Read More

The Battle for Safe Networks Could End with Open Sharing of Information

The Front Lines 17 Dec 2014 Editorial Team
In our last post, Shawn Henry, president of CrowdStrike Services and sought-after cybersecurity expert, talked with us about cybersecurity trends in 2014 and 2015. In this installment of that conversation,…
Read More

Advanced Falconry: Seeking out the Prey with Machine Learning

The Lab 16 Dec 2014 Sven Krasser
Interest in Machine Learning is on the rise. This was also evidenced by the attendance of our recent CrowdCast on the topic — if you haven’t seen it yet, head…
Read More

Moving Cybersecurity from Reactive to Proactive with Shawn Henry

Blog / The Front Lines 12 Dec 2014 Editorial Team
We recently spoke with cybersecurity expert Shawn Henry, president of CrowdStrike Services and former Executive Assistant Director of the Federal Bureau of Investigation, about the state of cybersecurity looking back…
Read More
Indicators of Attack vs. Indicators of Compromise

Indicators of Attack vs. Indicators of Compromise

The Falcon's Nest / The Front Lines 9 Dec 2014 Jessica DeCianno
What is an Indicator of Attack (IOA) and why is it necessary to take an IOA-based detection and prevention approach when dealing with advanced adversaries? Unlike Indicators of Compromise (IOCs) used…
Read More

December CrowdCast: Rockin’ Around Your Unsecured Network

The Adversary Line-up / The Tool Box 8 Dec 2014 Jessica DeCianno
It’s the most wonderful time of the year…until your network gets compromised. We’ve had a busy year here at CrowdStrike fighting adversaries. We’ve been watching their every move (and blocking…
Read More

I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors

The Adversary Line-up 24 Nov 2014 Matt Dahl
Over the last few months, the CrowdStrike Intelligence team has been tracking a campaign of highly targeted events focused on entities in the U.S. Defense Industrial Base (DIB), healthcare, government,…
Read More

Cloud-Based Security: The Next Generation of Defense for the Good Guys

The Bottom Line 21 Nov 2014 Steve Chabinsky
How does your company use the cloud?  Almost certainly it allows your employees to work more efficiently by enabling them to access email and vital documents wherever they are in…
Read More
Older Posts →