Blog

Written by: Brian Burke and John Crotty of Crowdstrike In the latest customer choice recognitions for endpoint detection and response (EDR), CrowdStrike stands as the highest rated vendor in the January 2019 Gartner Peer Insights Customers’ Choice for EDR.  That’s right: We did it — AGAIN!  On the heels of being named the highest rated vendor in the November2018 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms*, CrowdStrike was just named the highest rated...
Written by: Rainer Rhem Protecting data has become increasingly difficult. Between a lack of awareness, unintended user actions, system glitches, and increasingly sophisticated cyber adversaries, preventing data loss is no mean feat.  With increasing risks and expanding regulations for data protection, organisations must focus on closing security gaps that have emerged in the era of cloud and mobility. Indeed, as applications move to the cloud, users are accessing them directly everywhere they connect, which creates...
The true beginning to cybersecurity within any organization is awareness. Are you aware of your cyber surroundings? Are you and your employees trained and prepared to face a cyberthreat? You may know of the common cyber threats that cross your paths such as phishing, smishing, malware, and ransomware, but can you and your employees recognize every threat? Does your organization have a process when a potential breach has been detected? Cybersecurity tools are essential to mitigate risk, but...
Written by Damien Lewke of Crowdstrike Social engineering continues to be exploited by hackers and feared by security teams. Due to attackers’ subtlety and users’ natural curiosity, hackers succeed daily in baiting users to click on a link or answer a phishing email.  Baiting is a highly successful technique that relies on an organization’s weakest security link: the end user. This type of attack is so effective that it is used in over half of all successful...
Written by: Yogi Chandiramani of Zscaler The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security best practices obsolete. Indeed, as the workplace of the future moves into view, driven by ever-increasing user demand for flexible access to data and applications —...
Cybersecurity may seem like a foreign language to many executives and organizations who are not well versed on the subject. Despite how much you need cybersecurity, you don’t know what you don’t know. Do you have a strategy to minimize your risk? Are you seeking an expert to give your organization top tier cybersecurity direction? Look no further than AGT’s virtual (vCISO) services. A CISO is an expert cybersecurity practitioner who is responsible for an...
Written by: Damien Lewke of Crowdstrike The holidays are a time for reflection, getting together with friends, shopping — and increasingly, cybercrime. With the rise of e-commerce, adversaries gleefully look forward to the holidays as an opportunity to harvest valuable payment and credential information from record numbers of unsuspecting online shoppers. In the United States alone, online retail spending during this holiday season rose 19 percent over last year. In fact, over one-quarter of all...
Our world is mobile. You work in the office and everywhere else, using our mobile devices. What happens beyond your office’s firewall?  Are you secure inside your work environment? What about in the wild? Without endpoint security on your devices, you are vulnerable. What is endpoint security? Endpoint security is essential to the protection of you network infrastructure. In this new Bring Your Own Device (BYOD)  world, where employees and contractors use their own laptops,...
By Stan Lowe of Zscaler If there’s one thing we can predict for certain for 2019, it’s that cyber criminals will continue to spin up more and more innovative ways to exploit gaps in security. The hackers have IoT devices on their radar, and they’ll keep on looking to the cloud for new opportunities to attack vulnerable applications. As for the defenders, they’ll work on finding more effective security solutions that don’t overwhelm budgets. Below are...
Written By Scott Taschler of Crowdstrike Graph databases are having a bit of a moment in cybersecurity. With recent releases from industry juggernauts such as Microsoft and Google/VirusTotal, it seems “graph” could be poised to take center stage as a security industry buzzword and the next must-have cybersecurity technology. However, using a hot technology doesn’t deliver value by itself; it’s what you do with it that matters. More than five years ago, CrowdStrike® Threat Graph™...