By

Lindsay Melnick
Written by: Brian Burke and John Crotty of Crowdstrike In the latest customer choice recognitions for endpoint detection and response (EDR), CrowdStrike stands as the highest rated vendor in the January 2019 Gartner Peer Insights Customers’ Choice for EDR.  That’s right: We did it — AGAIN!  On the heels of being named the highest rated...
Read More
Written by: Rainer Rhem Protecting data has become increasingly difficult. Between a lack of awareness, unintended user actions, system glitches, and increasingly sophisticated cyber adversaries, preventing data loss is no mean feat.  With increasing risks and expanding regulations for data protection, organisations must focus on closing security gaps that have emerged in the era of...
Read More
The true beginning to cybersecurity within any organization is awareness. Are you aware of your cyber surroundings? Are you and your employees trained and prepared to face a cyberthreat? You may know of the common cyber threats that cross your paths such as phishing, smishing, malware, and ransomware, but can you and your employees recognize every threat?...
Read More
Written by Damien Lewke of Crowdstrike Social engineering continues to be exploited by hackers and feared by security teams. Due to attackers’ subtlety and users’ natural curiosity, hackers succeed daily in baiting users to click on a link or answer a phishing email.  Baiting is a highly successful technique that relies on an organization’s weakest...
Read More
Written by: Yogi Chandiramani of Zscaler The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security best practices obsolete. Indeed, as the...
Read More
Cybersecurity may seem like a foreign language to many executives and organizations who are not well versed on the subject. Despite how much you need cybersecurity, you don’t know what you don’t know. Do you have a strategy to minimize your risk? Are you seeking an expert to give your organization top tier cybersecurity direction?...
Read More
Written by: Damien Lewke of Crowdstrike The holidays are a time for reflection, getting together with friends, shopping — and increasingly, cybercrime. With the rise of e-commerce, adversaries gleefully look forward to the holidays as an opportunity to harvest valuable payment and credential information from record numbers of unsuspecting online shoppers. In the United States...
Read More
Our world is mobile. You work in the office and everywhere else, using our mobile devices. What happens beyond your office’s firewall?  Are you secure inside your work environment? What about in the wild? Without endpoint security on your devices, you are vulnerable. What is endpoint security? Endpoint security is essential to the protection of...
Read More
By Stan Lowe of Zscaler If there’s one thing we can predict for certain for 2019, it’s that cyber criminals will continue to spin up more and more innovative ways to exploit gaps in security. The hackers have IoT devices on their radar, and they’ll keep on looking to the cloud for new opportunities to...
Read More
Written By Scott Taschler of Crowdstrike Graph databases are having a bit of a moment in cybersecurity. With recent releases from industry juggernauts such as Microsoft and Google/VirusTotal, it seems “graph” could be poised to take center stage as a security industry buzzword and the next must-have cybersecurity technology. However, using a hot technology doesn’t...
Read More
1 2