This video will demonstrate how Falcon Horizon can leverage CrowdStrike's intelligence indicators to identify and prevent communication with bad actors from cloud environments.
Carbon Spider is a highly skilled criminal group that primarily targeted the hospitality and retail sectors in pursuit of payment card data. This interview with Nina Padavil, Strategic Threat Advisor, CrowdStrike, and Robert Bruno, Commercial Illustrator, will highlight Carbon Spider’s targets, tactics and motivations. You don't have a malware problem, you have an adversary problem – stay ahead of the adversaries and learn more at the Adversary Universe.
Falcon Flight Control Makes it easy for MSSPs and enterprises to organize and manage security at scale by allowing the environment to be logically segmented.
Cozy Bear is an adversary of Russian-origin, assessed as likely to be acting on behalf of the Foreign Intelligence Service of the Russian Federation. This interview with Jake Kwon, Strategic Threat Advisor, CrowdStrike, and Robert Bruno, Commercial Illustrator, will highlight Cozy Bear’s targets, tactics and motivations. You don't have a malware problem, you have an adversary problem – stay ahead of the adversaries and learn more at the Adversary Universe.
Does the dark web hold security secrets about your organization? Falcon X Recon collects and monitors activity from millions of restricted web pages, criminal forums and encrypted messaging platforms — the hidden recesses of the internet where criminal actors congregate and underground digital economies thrive. By empowering security teams to conduct investigations in real time, they can proactively uncover fraud, data breaches, phishing campaigns and other online threats that target their organization.
In this video, we will see an overview of the CrowdStrike Store. The store is an open ecosystem that provides access to CrowdStrike modules, partner applications, and plugins that use the existing Falcon agent and event data to address new challenges and maximize overall investment.
This video will demonstrate how Falcon Horizon’s policy assessments can help organizations identify suspect behaviors indicative of cryptomining attacks in their public cloud deployments.