Category

Security
Written by: Teju Shyamsundar of Okta In today’s tech landscape, the importance of securing user logins has become a no-brainer. We’re constantly seeing reports of data breaches as a result of identity attacks, and we know those threat actors aren’t going anywhere. According to the 2018 Verizon Data Breach Investigation Report, stolen credentials are still the...
Read More
Written by: Michael Busselen of Crowdstrike The CrowdStrike® 2019 Global Threat Report: “Adversary Tradecraft and the Importance of Speed,”includes the combined work of CrowdStrike’s skilled and seasoned teams that engage in global intelligence gathering and analyzing, proactive threat hunting, and incident response investigations. The threat report also reveals the trends that these teams have seen in 2018 — trends...
Read More
Written by: Damien Lewke of Crowdstrike The holidays are a time for reflection, getting together with friends, shopping — and increasingly, cybercrime. With the rise of e-commerce, adversaries gleefully look forward to the holidays as an opportunity to harvest valuable payment and credential information from record numbers of unsuspecting online shoppers. In the United States...
Read More
Our world is mobile. You work in the office and everywhere else, using our mobile devices. What happens beyond your office’s firewall?  Are you secure inside your work environment? What about in the wild? Without endpoint security on your devices, you are vulnerable. What is endpoint security? Endpoint security is essential to the protection of...
Read More
Written By Scott Taschler of Crowdstrike Graph databases are having a bit of a moment in cybersecurity. With recent releases from industry juggernauts such as Microsoft and Google/VirusTotal, it seems “graph” could be poised to take center stage as a security industry buzzword and the next must-have cybersecurity technology. However, using a hot technology doesn’t...
Read More
There are roughly 156 million phishing emails sent each day. 16 million of those emails make it to inboxes and are not sent to spam. Out of those numbers, 80,000 people take the lure per day from phishing emails. A phishing email attack is when a hacker baits an organization by posing to be someone...
Read More
Written by: Pooja Deshmukh from Zscaler Are you a frequent traveler? If so, you probably participate in at least one rewards program in which you accrue airline miles or earn hotel points. The hospitality industry practically invented these loyalty programs and they’ve been enormously popular, delivering value to customers and merchants alike. It turns out, membership account...
Read More
Did you know that the majority of cybersecurity threats you encounter come through the internet? When you are surfing the internet, your computer, your network, and your data is in critical danger of being breached. Internet security is mandatory for any organization. Internet security is the foundation of a multi-layered approach to cybersecurity. To keep...
Read More
Happy Cyber Monday from team AGT! Here’s a tip for todays internet shopper. Any website can be attacked by hackers, but limiting your shopping to established and trusted vendors limits your exposure. Bookmark the most trusted online retail sites to make sure you don’t get redirected to fakes. 
Read More
Written by Hamilton Yang, Sat Nath, and Peter Uys from Crowdstrike The recent discovery of the Remote Code Execution (RCE) vulnerability CVE-2018-4407 in Apple’s XNU operating system kernel may have been a cause for concern among organizations using Macs but CrowdStrike® is helping customers identify vulnerable Macs in their environments with a new dashboard. The XNU OS...
Read More
1 2 3 6