informa

Partner Perspectives

Putting the X Factor in XDR
While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin with a strong EDR foundation.
February 25, 2022
While extended detection and response (XDR) is effectively considered an upgrade from endpoint detection and response, enterprises must still begin with a strong EDR foundation.
by Anne Aarness, Sr. Manager, Product Marketing, CrowdStrike
February 25, 2022
4 min read
Article
Tales from the Dark Web, Part 3: How Criminals Monetize Ransomware
Ransomware operators rely on cryptocurrency and other payment schemes to keep their activities under the radar and harder to trace.
February 23, 2022
Ransomware operators rely on cryptocurrency and other payment schemes to keep their activities under the radar and harder to trace.
by Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Threat Intelligence,CrowdStrike
February 23, 2022
4 min read
Article
Why You Need An Adversary-First Approach to Threats in the Cloud
Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.
February 18, 2022
Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.
by David Puzas, Sr. Product Marketing Leader, Cloud Security; CrowdStrike
February 18, 2022
4 min read
Article
How Proactive Threat Hunting Redefines the Zero-Day
Threat hunters are continuously and actively scouring the environment for clues of a malicious incursion.
February 16, 2022
Threat hunters are continuously and actively scouring the environment for clues of a malicious incursion.
by Nick Lowe, Director, Falcon OverWatch, CrowdStrike
February 16, 2022
4 min read
Article
Seven Key Ingredients to Effective Incident Response
With ransomware attacks on the rise, organizations need to upgrade their incident response processes to improve speed and precision.
February 11, 2022
With ransomware attacks on the rise, organizations need to upgrade their incident response processes to improve speed and precision.
by Tim Parisi, director of incident response services, CrowdStrike
February 11, 2022
6 min read
Article
Mitigate Ransomware Risks With Modern Log Management
Enterprises using a modern log management platform have key tools in place to detect and mitigate some of the risks from a ransomware attack.
February 09, 2022
Enterprises using a modern log management platform have key tools in place to detect and mitigate some of the risks from a ransomware attack.
by Simon Simonsen, Sr. Security Architect, CrowdStrike
February 09, 2022
4 min read
Article
Prioritizing the Right Vulnerabilities to Reduce Risk
Prioritization needs to be part of vulnerability management if security teams are to keep up and mitigate issues in a timely manner.
February 08, 2022
Prioritization needs to be part of vulnerability management if security teams are to keep up and mitigate issues in a timely manner.
by Alyssa Ideboen, Product Marketing, Security Operations, CrowdStrike
February 08, 2022
5 min read
Article
Simplifying Zero Trust Security in Healthcare Organizations
Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.
February 03, 2022
Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.
by Kapil Raina, VP Zero Trust & Identity Marketing, CrowdStrike
February 03, 2022
4 min read
Article
Managing Detections Is Not the Same as Stopping Breaches
Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.
February 02, 2022
Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.
by Austin Murphy, vice-president of managed services, CrowdStrike
February 02, 2022
5 min read
Article
Tales from the Dark Web, Part 2: Ransomware Stacked With Distribution Services Creates the Perfect Storm
Security professionals need to understand the actors behind ransomware threats, how they operate and how they continuously find new victims to target
January 25, 2022
Security professionals need to understand the actors behind ransomware threats, how they operate and how they continuously find new victims to target
by Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Threat Intelligence,CrowdStrike
January 25, 2022
4 min read
Article
How Modern Log Management Strengthens Enterprises’ Security Posture
If security teams are not logging everything, they are increasing security risk and making it more difficult to investigate and recover from a data breach. Modern log management goes beyond just a SIEM.
December 21, 2021
If security teams are not logging everything, they are increasing security risk and making it more difficult to investigate and recover from a data breach. Modern log management goes beyond just a SIEM.
by Simon Simonsen, Sr. Security Architect, CrowdStrike
December 21, 2021
4 min read
Article
Time to Reset the Idea of Zero Trust
CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.
December 17, 2021
CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.
by Kapil Raina, VP Zero Trust & Identity Marketing, CrowdStrike
December 17, 2021
5 min read
Article
XDR: What It Is, What It Isn't
The three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
December 14, 2021
The three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
by Zeki Turedi, CTO for EMEA, CrowdStrike
December 14, 2021
5 min read
Article
Tales from the Dark Web: Fingerprinting Access Brokers on Criminal Forums
Every high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
December 13, 2021
Every high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
by Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Threat Intelligence,CrowdStrike
December 13, 2021
5 min read
Article
SEARCH for Hidden Cyber Threats: 6 Steps to Unleash a Hyper-effective Threat Hunting Team
SEARCH is a carefully-tuned methodology that balances people, process and technology for threat hunters actively searching for, and disrupting, distinctly human threats.
December 06, 2021
SEARCH is a carefully-tuned methodology that balances people, process and technology for threat hunters actively searching for, and disrupting, distinctly human threats.
by Scott Taschler, Director of Product Marketing for CrowdStrike
December 06, 2021
5 min read
Article