Cloud & Application Security

New CrowdResponse Modules
Three Ways to Enhance Your Cloud Security with External Attack Surface Management
CrowdStrike Cloud Security Defines the Future of an Evolving Market
5 Best Practices to Secure AWS Resources
Porter Airlines Consolidates Its Cloud, Identity and Endpoint Security with CrowdStrike
Welcome to Fal.Con 2022: CrowdStrike Drives the Convergence of Security and Observability
5 Best Practices to Secure Azure Resources
Welcome to Fal.Con 2023: CrowdStrike Ushers in the Future of Cybersecurity
Key Characteristics of Modern Fileless Attacks
Hiding in Plain Sight: Remediating “Hidden” Malware with Real Time Response
CrowdStrike Debuts Counter Adversary Operations Team to Fight Faster and Smarter Adversaries as Identity-Focused Attacks Skyrocket
Architecture Drift: What It Is and How It Leads to Breaches
Many Paths, One Goal: Forging a Career in Cybersecurity
Beyond Compliance: Secure Your Business in the Cloud with Falcon Cloud Security
Development Cost of Porting TensorFlow Models to Pure Rust
RSAC 2022: CrowdStrike Delivers Protection that Powers Productivity
The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software
Big Game Hunting TTPs Continue to Shift After DarkSide Pipeline Attack
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis
CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes
Security Guidance from the Front Lines of Cloud Incident Response
CrowdStrike Defines the Future of Cloud Security with One-Click XDR to Automatically Identify and Secure Unmanaged Cloud Assets
CrowdStrike Falcon® Certified as Legacy AV Replacement
Chaos in the Cloud: Rampant Cloud Activity Requires Modern Protection
3 Ways Visualization Improves Cloud Asset Management and Security
CrowdStrike and Verizon Form Partnership to Provide Integrated Solutions and Services to Customers
Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes
Quadrant Knowledge Solutions Names CrowdStrike a Leader in the 2022 SPARK Matrix for Digital Threat Intelligence Management
CrowdStrike Services Helps Organizations Prioritize Patching Vulnerabilities with CrowdStrike Falcon Spotlight
Join CrowdStrike at AWS re:Invent 2020
Building on the Shoulders of Giants: Combining TensorFlow and Rust
CrowdStrike Integrated Intelligence and Deployment Automation Enhance New AWS Network Firewall
Maze Ransomware Analysis and Protection
HIMSS and Beyond: What’s Next in Healthcare Security
CrowdStrike Is Proud to Sponsor the Mac Admins Foundation
CrowdStrike Falcon Platform Achieves Certification in AV-Comparatives' First Anti-Tampering Test
DirtyCred: Opening Pandora’s Box to Current and Future Container Escapes
How Fast Can You Grep?
Welcome to the Adversary Universe Podcast: Unmasking the Threat Actors Targeting Your Organization
CrowdStrike Announces Expanded Partnership at AWS re:Invent 2021
Top Threats You Need to Know to Defend Your Cloud Environment
How CrowdStrike Detects Cloud Storage Misconfigurations to Protect Valuable Data
CrowdStrike Announces $200 Million Series E Financing Round with New and Existing Investors
Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack
CrowdStrike Delivers Adversary-Focused, Platform Approach to CNAPP and Cloud Security
Leading Global Brands Secure Themselves with CrowdStrike
Maintaining Security Consistency from Endpoint to Workload and Everywhere in Between
Forrester Names CrowdStrike a Leader in the 2021 Wave for External Threat Intelligence
Malspam in the Time of COVID-19
The Easy Solution for Stopping Modern Attacks
Why Machine Learning Is a Critical Defense Against Malware
How to Protect Cloud Workloads from Zero-day Vulnerabilities
Know Your Enemy: Exploiting the Dell BIOS Driver Vulnerability to Defend Against It
New CrowdStrike Capabilities Simplify Hybrid Cloud Security
Why You Need an Adversary-focused Approach to Stop Cloud Breaches
5 Common Hybrid IT Security Challenges and How to Overcome Them
4 Major Falcon LogScale Next-Gen SIEM Updates That Accelerate Time-to-Insights
RSAC 2022: CrowdStrike Innovations that Prioritize Data
Gimme Shellter
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis
Closing the Cloud Security Skills Gap: MDR for the Cloud
CrowdStrike and AWS Expand Partnership to Offer Customers DevOps-Ready Security
Detect Adversary Behavior in Real Time With CrowdStrike Falcon® Horizon and Amazon EventBridge
Stop Cloud Breaches With Threat Graph Cloud-Powered Analytics: Intelligent, Automated, Accurate
The Myth of Part-time Hunting, Part 1: The Race Against Ever-diminishing Breakout Times
Three Key Features of Log Management for Cloud Native Systems
Google Capital Bets Big on CrowdStrike to Accelerate Hyper-growth
Evaluating Your Organization's Security Approach: Tips For BOD and C-Level Execs
How to Fill the Cybersecurity Skills Gap With Homegrown Talent
Do You Know What’s Hiding in Your Containers?
To Get Cloud Security Cooking, You Need The Right Recipe For Success
Falcon OverWatch Hunts Down Adversaries Where They Hide
Solving the Complexity of Azure Identity: Horizon Identity Analyzer
First-Ever Adversary Ranking in 2019 Global Threat Report Highlights the Importance of Speed
CrowdStrike Debuts Product and Partnership News at AWS re:Invent 2019
CrowdStrike Falcon® Forensics: Ditch Inefficient Incident Response Tools for Good
Blind Spots in the Cloud
CrowdStrike Mobile Threat Report Offers Trends and Recommendations for Securing Your Organization
Intelligence-led Rapid Recovery: Getting Back to Business Faster
Adversaries Go Hands-On in Japan: Know the Threat and Know the Solution
Confessions of a Responder: The Hardest Part of Incident Response Investigations
Uncovering The “Unknown Unknowns”: Why Threat Hunting is a Security Must-Have
CrowdStrike Falcon® Detects Kernel Attacks Exploiting Vulnerable Dell Driver (CVE-2021-21551)
Stopping Cyber “Shakedowns” — How to Protect Against Extortion-Based eCrime
Unexpected Adventures in JSON Marshaling
Cloud-based Security: Future of the Industry?