Blog

A stream of Chipotle customers have said their accounts have been hacked and are reporting fraudulent orders charged to their credit cards — sometimes totaling hundreds of dollars. Customers have posted on several Reddit threads complaining of account breaches and many more have tweeted at @ChipotleTweets to alert the fast food giant of the problem. In most cases, orders were put through under a victim’s account and delivered to addresses often not even in the victim’s state. Many of the customers TechCrunch spoke...
Written by Ryan Stewart Attackers compromised Microsoft support agent’s credentials and gained access to view ‘limited’ number of users’ email account information.Upon learning about the incident, Microsoft immediately disabled the compromised support agent’s credentials. What is the issue – Microsoft notified its users via email that a certain ‘limited’ number of users who use web email services managed by Microsoft might have had their accounts compromised. What happened? Attackers compromised Microsoft support agent’s credentials and gained...
What does your company culture feel like? Do you work in a positive environment? Productivity begins with the employees of a corporation. If happiness is amongst the workforce, productivity and success increases. That is not a theory, judging by statistics, it is a fact. Company culture has changed as our generations have. I speak for millennial workers, as I am one, when I say that what we value the most in life is our independence...
Written By: Jen Toscano As enterprises embrace digital transformation, they must find a new way to manage networking and security. Many are turning to SD-WAN to reduce MPLS costs, simplify branch IT, increase agility, and deliver an improved user experience. But, securing SaaS and internet-bound traffic for all users at all locations—without compromising on security—can present obstacles. Unaddressed, these security challenges can undermine the benefits of your SD-WAN deployment. Let’s examine what you really need to know about...
Written by: Dan Shelton One of the most tragic things in the world of IT is when people adopt a new technology but don’t adopt a new way of working. The reason this is a problem is that almost every piece of enterprise software is much more than the application itself. It’s also a mindset, a way of working that uses the software to create business value. You can see a classic example of the importance...
Written by: Joanna Flower CrowdStrike’s incredible success at this year’s RSA event included winning the SC Magazine 2019 Trust Award for Best Threat Intelligence Technology for Falcon X™, our automated threat intelligence solution and part of the comprehensive CrowdStrike® Falcon® platform. This award was presented at a dinner hosted by SC Magazine on Tuesday, March 5, during RSA. In giving our Falcon X technology this recognition, SC Magazine cited a January 2018 Gartner Magic Quadrant report that...
Written by: Deepen Desai Once seen as the ultimate protection for data being transmitted over the internet, encryption has become a vast playground for cybercriminals. Zscaler ThreatLabZ, the research organization at Zscaler, analyzed the encrypted traffic traversing the Zscaler cloud in the second half of 2018 and prepared a report of our findings. The Zscaler cloud processes more than 60 billion transactions a day and, at that volume, it provides valuable insight into traffic patterns and the...
In 2019, the top fortune 1000 companies are adopting cutting edge solutions that empower the remote worker to promote better productivity. These solutions increase teamwork so employees can focus on the core business instead of being distracted in a large corporate environment. With cloud based security solutions, the employer has maximum visibility of productivity while keeping company data secure. This offers employees the freedom to work remote while offering employers a chance to have security...
Written by: Brian Burke and John Crotty of Crowdstrike In the latest customer choice recognitions for endpoint detection and response (EDR), CrowdStrike stands as the highest rated vendor in the January 2019 Gartner Peer Insights Customers’ Choice for EDR.  That’s right: We did it — AGAIN!  On the heels of being named the highest rated vendor in the November2018 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms*, CrowdStrike was just named the highest rated...
Written by: Rainer Rhem Protecting data has become increasingly difficult. Between a lack of awareness, unintended user actions, system glitches, and increasingly sophisticated cyber adversaries, preventing data loss is no mean feat.  With increasing risks and expanding regulations for data protection, organisations must focus on closing security gaps that have emerged in the era of cloud and mobility. Indeed, as applications move to the cloud, users are accessing them directly everywhere they connect, which creates...