Context In today’s rapidly evolving threat landscape, the need for dynamic security measures is critical. Due to Windows’s current architecture and design, security products running in the platform, particularly those involved in endpoint protection, require kernel access to provide the highest level of visibility, enforcement and tamper-resistance, while meeting the strict … [Read more...] about CrowdStrike’s Kernel Access and Security Architecture
CrowdStrikes
Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List
The threat intel data noted in this report is available to tens of thousands of customers, partners and prospects – and hundreds of thousands of users. Adversaries exploit current events for attention and gain. We remain committed to sharing data with the community. On July 24, 2024, hacktivist entity USDoD claimed on English-language cybercrime forum BreachForums to have … [Read more...] about Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List
CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)
The major news in technology policy circles is this month’s release of the long-anticipated Executive Order (E.O.) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. While E.O.s govern policy areas within the direct control of the U.S. government’s Executive Branch, they are important broadly because they inform industry best practices and can … [Read more...] about CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)
A Sneak Peek of CrowdStrike’s 2023 Global Threat Report
The CrowdStrike 2023 Global Threat Report, among the most trusted and comprehensive research on the modern threat landscape, explores the most significant security events and trends of the previous year, as well as the adversaries driving this activity. The latest edition of the CrowdStrike Global Threat Report comes at a critical time for organizations around the world. … [Read more...] about A Sneak Peek of CrowdStrike’s 2023 Global Threat Report
Inside the MITRE ATT&CK Evaluation: How CrowdStrike’s Elite Managed Services Operate in the Real World
Following CrowdStrike’s strong performance in the first-ever MITRE ATT&CK® Evaluations for Security Managed Services Providers with 99% detection coverage, we take a deep dive into the testing process and how our elite managed services operate in the real world. We recently announced CrowdStrike achieved 99% detection coverage in the inaugural MITRE ATT&CK Evaluations … [Read more...] about Inside the MITRE ATT&CK Evaluation: How CrowdStrike’s Elite Managed Services Operate in the Real World
Meet CrowdStrike’s Strategic Counter-Adversarial Research Team (SCAR)
As a human-led managed threat hunting service, CrowdStrike Falcon OverWatch™ is built around the best and brightest analysts in the industry who lead the fight against today’s sophisticated adversaries. But while humans remain the critical ingredient that makes OverWatch so successful, these hunters are also supported by best-in-class technologies that enable them to work at … [Read more...] about Meet CrowdStrike’s Strategic Counter-Adversarial Research Team (SCAR)
Extend Threat Visibility With Humio’s Integration With CrowdStrike’s Indicators of Compromise (IOCs)
This blog was originally published Oct. 1, 2021 on humio.com. Humio is a CrowdStrike Company. What is an indicator of compromise (IOC)? An indicator of compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been breached. The ability to monitor for indicators of compromise is critical to a comprehensive cybersecurity strategy, … [Read more...] about Extend Threat Visibility With Humio’s Integration With CrowdStrike’s Indicators of Compromise (IOCs)
CrowdStrike’s Real Time Response Enables System Recovery
Introduction Cyberattacks including ransomware have increased as work environments have changed, and organizations have shifted to supporting more remote personnel. With threats increasing against these remote systems, the ability to block attacks and respond rapidly in the event of a compromise is even more challenging. Do security teams have the visibility and context they … [Read more...] about CrowdStrike’s Real Time Response Enables System Recovery
Why CrowdStrike’s Work Culture is Remote-First
Over the past decade, remote work has been gradually shifting from a coveted perk to a popular arrangement, especially in the tech sector — and in recent months, COVID-19 has expedited that shift across many industries. For digital-native companies like CrowdStrike®, the ability to work remotely is a deliberate strategy that fuels rapid innovation and attracts the best and … [Read more...] about Why CrowdStrike’s Work Culture is Remote-First
CrowdStrike’s Real Time Response Expands Protections
Introduction Sinkholes can be used by both bad actors and system administrators alike. Bad actors can redirect systems to malicious domains and security admins can stop systems from reaching those domains. If remote employees are not using the corporate VPN, do security teams have the ability to manipulate system redirects and sinkhole malicious … [Read more...] about CrowdStrike’s Real Time Response Expands Protections