Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

CrowdStrike Takes On Spyboy's "Terminator"

On May 21, 2023, a new threat actor named Spyboy emerged, advertising a tool known as “Terminator” in a Russian-language forum, claiming the software could bypass over 20 common AV and EDR controls. CrowdStrike automatically blocked this executable, categorizing this as a high-severity detection, enabled by our AI-powered indicators of attack.

Simple. Fast. Easy. How Deployments Should be.

Getting started with new security tools can be a huge headache for organizations. Think about your last implemented security solution — how long did it take to make sure your business was 100% onboarded with maximum confidence? In this episode, we’ll show you how CrowdStrike enables you to onboard thousands of endpoints in minutes with full peace of mind.

MXDR Demo: Eradicating Multi-Vector Fileless Malware Attack in Minutes

CrowdStrike Falcon Complete XDR is the world’s first managed extended detection and response (MXDR) service with end-to-end remediation, from the #1 MDR leader. In this video, we demonstrate how the Falcon Complete XDR service team identifies, triages, and fully-remediates the cross-domain XDR threat activity associated with an advanced, file-less malware attack as the adversary attempts to persist and exfiltrate from servers in the customer’s environment.

Under the Wing: Protecting Small Businesses Against Big Attacks

70% of all cyberattacks target small to midsize businesses. Adversaries know that most small businesses don’t have the time, tools or staff to go head to head against today’s threats. In this episode, learn how fast, simple and affordable it can be to protect your business.

Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.

Securing private applications with CrowdStrike and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.

CrowdStrike and Abnormal Security: Better Together

Abnormal Security CEO Evan Reiser and CrowdStrike President Michael Sentonas announce a new strategic technology partnership that integrates the CrowdStrike Falcon platform with the Abnormal platform to offer best-in-class email attack detection and response with endpoint and automated account remediation. Abnormal Security is also a member of the CrowdXDR Alliance, a revolutionary security alliance that delivers unified XDR enterprise-wide.