Welcome to The Adversary Manifesto.
It’s common place these days for security companies to have some sort of publication where they can espouse their views on cyber threat prevention and detection and release research into vulnerabilities. While we’re no different in wanting to share our perspective with you, what is different is the philosophy behind our work.
We believe that in order to fully understand the cyber threat environment you need to be able to build the best possible defenses and be forearmed for effective mitigation and remediation, but you can only do this technical-level work if you have the intelligence on hand to understand the adversary behind the attack. A cyber security philosophy built on adversary intelligence allows you to build a broad spectrum security defense posture from the ground up, so that responses are no longer reactionary but part of your security manifesto. After all, security is a human problem on both sides of the equation. Our network’s adversaries are not bits of code, but humans with a disruptive mission to achieve and on the other side, there’s us and your information security team with our own mission to defend assets and, in CrowdStrike’s case, to problem solve to build resilience into your IT security posture and to give you the tools to stop the person, or group, behind the attack. And we do all this by leveraging the power of information that you already have, combining it with anonymized data from our global customer base to provide you with the capability to box in your adversary, deny them the opportunity to make the moves against your network, and shut them down, once and for all.
Interested in seeing how we put this into practice? Spend a little time with The Adversary Manifesto each week to keep current with security news, insights from our experts, many of whom have been shaping the industry since its inception, and of course for our latest adversary profiles.
If you’re thinking about applying the insight we share on The Adversary Manifesto within your organization, keep in mind that the views expressed here are those of the authors, and not necessarily those of CrowdStrike, and that CrowdStrike’s approach to security might not be applicable to your situation. However, if you’d like to ask more specific questions you can always contact us.