Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CrowdStrike

Below you will find reports with the source of “CrowdStrike”

image from 2021 Global Threat Report

2021 Global Threat Report

This annual report offers important lessons and recommendations for security teams operating in today’s environment, where visibility and speed are more critical than ever. (more available)
Added: April 19, 2022
image from 2022 Global Threat Report

2022 Global Threat Report

The CrowdStrike 2022 Global Threat Report provides crucial insights into what security teams need to know about to stay ahead of today’s threats in an increasingly ominous threat landscape. (more available)
Added: April 19, 2022
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

This report explores many different areas of cybersecurity in 2020, including how ransomware has changed, why nation-state actors have been so motivated to target organizations, and also the growing importance of layering security transformation into your digital transformation strategies. (more available)
Added: January 29, 2021
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

A survey of 2,200 IT professionals from organizations of 250 or more employees. Focuses on attitudes on and about cybersecurity.
Added: November 21, 2020
image from 2020 Global Threat Report

2020 Global Threat Report

If there’s one thing this year’s Global Threat Report really brings home, it’s that there’s never been a better time to get involved in cybersecurity. (more available)
Added: March 29, 2020
image from Overwatch 2019 mid-year report

Overwatch 2019 mid-year report

An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019. (more available)
Added: November 25, 2019
image from 2019 Global Threat Report - Adversary Tradecraft And The Importance Of Speed

2019 Global Threat Report - Adversary Tradecraft And The Importance Of Speed

This year’s Global Threat Report: “Adversary Tradecraft and the Importance of Speed,” addresses the quickening pace and increasing sophistication in adversary tactics, techniques and procedures (TTPs) over the past year — and in particular, highlights the critical importance of speed in staying ahead of rapidly evolving threats. (more available)
Added: March 6, 2019
image from Cyber Intrusion Services Casebook 2018

Cyber Intrusion Services Casebook 2018

From the report, “This casebook presents some of the findings and recommendations we’ve made in key engagements across a representative sample of the work we performed last year. (more available)
Added: January 15, 2019
image from Threat Intelligence: Cybersecurity's Best Kept Secret

Threat Intelligence: Cybersecurity's Best Kept Secret

The goal of this white paper is to bring clarity to cyber threat intelligence. It explains the different categories of CTI and discusses some use cases to illustrate ways it can be applied and utilized to augment security teams’ efficiency and gain an edge over the attackers. (more available)
Added: January 1, 2019
image from Ransomware A Growing Enterprise Threat

Ransomware A Growing Enterprise Threat

This report offers insight into Ransomware and explains the growing threat that impacts enterprise security.
Added: January 1, 2019
image from The Rise Of Machine Learning In Cybersecurity

The Rise Of Machine Learning In Cybersecurity

The purpose of this white paper is to help users understand how CrowdStrike ® uses ML to protect endpoints. To get there, we must first clarify what ML is and how it works. (more available)
Added: January 1, 2019
image from Indicators of Attack Versus Indicators of Compromise

Indicators of Attack Versus Indicators of Compromise

Based on extensive use of CrowdStrike’s next generation endpoint protection platform to detect and prevent sophisticated attacks against large organizations, CrowdStrike’s in house team of security experts, adversary hunters, intelligence analysts and incident responders have pooled their knowledge to produce this valuable guidebook and checklist for proactively enhancing your corporate information security procedures while avoiding common mistakes and pitfalls. (more available)
Added: January 1, 2019
image from 5 Reasons Endpoint Security Must Move To The Cloud

5 Reasons Endpoint Security Must Move To The Cloud

This brief whitepaper offers some thoughts on why endpoint security should move to the cloud.
Added: January 1, 2019
image from Cyber Attack Survival Checklist

Cyber Attack Survival Checklist

This report offers a checklist for surviving a Cyber Attack.
Added: January 1, 2019
image from Cybersecurity During A Merger

Cybersecurity During A Merger

Cybersecurity has emerged as a key risk factor to be weighed during the due diligence process of any merger and acquisition. (more available)
Added: January 1, 2019
image from Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

The big-name breaches have made us all sensitive to the loss of personal and competitive data. But are we overlooking the real risks? (more available)
Added: January 1, 2019
image from Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting The Undetectable

This report discusses a key issue in a Malware-centric defense approach; it will leave you vulnerable to attacks that don’t leverage malware. (more available)
Added: January 1, 2019
image from Why Managed Threat Hunting?

Why Managed Threat Hunting?

This report offers insight into threat hunting. It specifically focusses on the “Human Detection Engine.”
Added: January 1, 2019
image from Seizing Control OF Software Supply Chain Security

Seizing Control OF Software Supply Chain Security

This paper presents the results of a survey that sought to understand how IT decision makers are thinking about the term “software supply chain attacks. (more available)
Added: January 1, 2019
image from Intelligence Report: CSIR-18004 Nigerian Confraternities Emerge

Intelligence Report: CSIR-18004 Nigerian Confraternities Emerge

This paper discuses a particular Business Email Compromise that has appeared out of Nigeria.
Added: January 1, 2019
image from Services Cyber Intrusion Casebook 2018

Services Cyber Intrusion Casebook 2018

In 2018, our global Services team focused resources, intelligence and technology to detect and disrupt future attacks. We’ve analyzed the massive amounts of security data collected from every engagement this year and we’ve gained new insights into what challenges organizations face and how they can better prepare for the next wave of threats. (more available)
Added: December 14, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 21, 2022 12:08 UTC (build d6199b1)