As CrowdStrike’s Advanced Memory Scanning capability has matured, so have its applications. CrowdStrike detection engineers and researchers work tirelessly to ensure the CrowdStrike Falcon® platform’s detection content stays ahead of adversaries. The following case study describes how CrowdStrike leverages memory scanning in combination with new IOAs to provide world-class protection to our customers.
Firewall technology for network security has undergone considerable advancement with the introduction of cloud computing and the vanishing network perimeter with hybrid and multi-cloud environments. All along this transformation one thing that did not change is the way endpoints are identified – through the TCP/IP stack, specifically the IP address. This design principle needed a change for container-based applications. How did the NGFWs fare?
Hi everyone, In a company all hands at the start of 2023, I shared that before the end of the year, we would officially make Tines available to teams outside security. You had a lot of questions, the most common of which was “why are we doing this?” My answer was that “this was always the plan”. Although true, that wasn’t exactly a helpful or insightful response.
With many nuances to consider, adhering to the General Data Protection Regulation (GDPR) requirements can be a daunting task. After all, the entirety of the GDPR consists of a whopping 99 Articles. Fortunately, by following a GDPR security checklist, you can help your organization ensure that all required facets of data security are covered without sifting through pages and pages of legalese.
Let's face it: Managing cybersecurity for multiple clients as an MSP can feel like navigating a maze, full of pitfalls and traps. Just when you think you have one security issue managed, another one pops up.