With its wild beauty, favorable tax laws and growing tech scene, the State of Wyoming is experiencing a surge in business growth. But with this prosperity comes a rise in cyber risk due to the expanding commerce platforms and digital infrastructure needed to support it. “We’ve had several large tech companies relocate to Wyoming recently,” explained Jason Strohbehn, Deputy CISO … [Read more...] about State of Wyoming Looks to Expand CrowdStrike Protections Statewide
Protections
New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections
Jan 01, 2024NewsroomWindows Security / Vulnerability Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that could be used by threat actors to bypass security mechanisms and achieve execution of malicious code on systems running Microsoft Windows 10 and Windows 11. The approach "leverages executables commonly … [Read more...] about New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections
Add Automated Security Protections with CrowdStrike and Box Partnership
The risk of cyberattacks continues to grow for small to medium-sized businesses (SMBs). Today, a staggering 70% of cyberattacks target SMBs, a scourge that cost organizations with fewer than 500 employees an average of $3.31 million USD in 2022, up 13.4% over the previous year. Adversaries tend to take the path of least resistance. This often means targeting small businesses, … [Read more...] about Add Automated Security Protections with CrowdStrike and Box Partnership
Automating the Security Protections rapid response to malware
Cyber attacks on corporate networks were up 50% in 2021, and it’s expected that 2022 will see more of the same. Elastic Endpoint Security includes a variety of protection layers to ensure maximum coverage against different types of malware. There have been a few examples recently of the need for fast, accurate updates of user environments in order to protect against the latest … [Read more...] about Automating the Security Protections rapid response to malware
CrowdStrike’s Real Time Response Expands Protections
Introduction Sinkholes can be used by both bad actors and system administrators alike. Bad actors can redirect systems to malicious domains and security admins can stop systems from reaching those domains. If remote employees are not using the corporate VPN, do security teams have the ability to manipulate system redirects and sinkhole malicious … [Read more...] about CrowdStrike’s Real Time Response Expands Protections