CrowdStrike
- Security
- 0 Case Studies
CrowdStrike is a cybersecurity technology firm pioneering cloud delivered next-generation endpoint protection and services.
Jul 22
Global Survey Reveals Supply Chain as a Rising and Critical New Threat Vector
Learn why supply chain attacks are on the rise and how IT security professionals view this critical new threat vector in CrowdStrike supply chain survey.
Feb 21
2021 Global Threat Report: Analyzing a Year of Chaos and Courage
In introducing the 2021 Global Threat Report, CEO George Kurtz says “2020 was perhaps the most active year in memory.” He explains how that shaped this year’s report.
Feb 21
Mapping It Out: Analyzing the Security of eBPF Maps
Take a deep dive into the security implications for eBPF users by exploring how eBPF is used in Linux and Cloud environments, and how it can be abused by attackers.
Feb 21
To Get Cloud Security Cooking, You Need The Right Recipe For Success
Securing multiple clouds requires a unified platform. These are the three ingredients your team needs to run successful and effective cloud security.
POSTS FROM RELATED COMPANIES
Preventing SQL injections in PHP (and other vulnerabilities)
Learn what SQL injection in PHP is, the consequences of an attack, and how an attacker can take advantage of...
McDonald’s Partners with Sift to Protect Millions of Mobile App Users Around ...
McDonald’s adopts Sift Digital Trust & Safety to stop fraud and streamline the mobile app experience in Europe, Asia, Africa,...
Adding two-factor authentication to your iOS app using TypingDNA
See how TypingDNA Authentication API allows you to easily add authentication to your iOS application—without having to worry about storing...
Adding two-factor authentication to your iOS app using TypingDNA
See how TypingDNA Authentication API allows you to easily add authentication to your iOS application—without having to worry about storing...
What Is Behavioral Biometrics?
Behavioral biometrics is a breakthrough technology solving key authentication challenges. Read examples of top use cases.