informa

CrowdStrike

How Modern Log Management Strengthens Enterprises’ Security Posture
If security teams are not logging everything, they are increasing security risk and making it more difficult to investigate and recover from a data breach. Modern log management goes beyond just a SIEM.
December 21, 2021
If security teams are not logging everything, they are increasing security risk and making it more difficult to investigate and recover from a data breach. Modern log management goes beyond just a SIEM.
by Simon Simonsen, Sr. Security Architect, CrowdStrike
December 21, 2021
4 min read
Article
Time to Reset the Idea of Zero Trust
CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.
December 17, 2021
CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.
by Kapil Raina, VP Zero Trust & Identity Marketing, CrowdStrike
December 17, 2021
5 min read
Article
XDR: What It Is, What It Isn't
The three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
December 14, 2021
The three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
by Zeki Turedi, CTO for EMEA, CrowdStrike
December 14, 2021
5 min read
Article
Tales from the Dark Web: Fingerprinting Access Brokers on Criminal Forums
Every high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
December 13, 2021
Every high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
by Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Threat Intelligence,CrowdStrike
December 13, 2021
5 min read
Article
SEARCH for Hidden Cyber Threats: 6 Steps to Unleash a Hyper-effective Threat Hunting Team
SEARCH is a carefully-tuned methodology that balances people, process and technology for threat hunters actively searching for, and disrupting, distinctly human threats.
December 06, 2021
SEARCH is a carefully-tuned methodology that balances people, process and technology for threat hunters actively searching for, and disrupting, distinctly human threats.
by Scott Taschler, Director of Product Marketing for CrowdStrike
December 06, 2021
5 min read
Article