โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayCrowdStrike

Meet the Protectors: New Video Series Spotlights Cybersecurity Leaders Powered by CrowdStrike

21 July 2023 at 16:37

You donโ€™t have a malware problem โ€” you have an adversary problem. CrowdStrike has relentlessly focused on finding and stopping the humans behind cyberattacks. Today, weโ€™re launching a new series that highlights the people who fight back against these threats every day.

Weโ€™re excited to announce the launch of the Protectors Spotlight, a new series of short videos celebrating the cybersecurity professionals protecting their organizations and communities. Each video pulls the curtain back to tell the story of the customers fighting the good fight on a daily basis. The series looks at who they are, the organization theyโ€™re defending, the winding road of their security journeys and how they use the CrowdStrike Falconยฎ platform to stop breaches so their organization can innovate and grow.ย 

Protectors partner with CrowdStrike to stop breaches and protect their data. Many will be joining us at Fal.Con 2023. Register now and meet us in Las Vegas Sept. 18-21!ย 

Every customer has a unique story, and each faces different challenges in protecting their organizations from todayโ€™s relentless and sophisticated adversaries. But they all have one thing in common: trusting CrowdStrike to keep them secure and protect what matters most.

In the first few Protectors videos, we spotlight leaders at nine organizations across critical industries that face constant adversary attacks, including healthcare, financial services, state and local government, and more. Listen to the Protectors at Montage Health, Mercury Financial, Vijilan Security, Seagate Technology, The City of Las Vegas, State of Oklahoma, Claroty, Jemena and Parkway Schools tell their stories and share their journey with CrowdStrike.ย 

One of these leaders is Kevin Nejad, Founder and CEO of Vijilan Security. He was in a tough spot when the companyโ€™s legacy security information and event management (SIEM) system couldnโ€™t keep up with demand โ€” eventually impeding growth.

โ€œOur infrastructure couldnโ€™t scale very well, performance went down, and costs went through the roof,โ€ he said in his Protectors video. โ€œThe management of data using SIEM technology became a hindrance in our growth. And thatโ€™s when we discovered CrowdStrike.โ€ย 

Watch the trailer:

Also featured in the Protectors Spotlight is David Worthington, CISO of Australian energy firm Jemena. He saw an opportunity to improve visibility across the business environment and, in doing so, quickly address potential threats.

โ€œWhen you have visibility and you know whatโ€™s going on, you can actually plan and make sure things are going right, rather than waiting for some actor to come along and do something,โ€ he said. โ€œFor me, that was the key. Weโ€™re going to see things earlier and respond a lot quicker.โ€

We are honored to highlight the people who fight back against these threats every day with fearlessness and a sense of mission and purpose โ€” just as CrowdStrike does. We stop breaches so our customers can continue doing what they do best: Build a better world while serving their customers.ย 

Additional Resources

Welcome to the Adversary Universe Podcast: Unmasking the Threat Actors Targeting Your Organization

13 July 2023 at 18:18

The modern adversary is relentless. Todayโ€™s threat actors target global organizations with increasingly sophisticated attacks. As weโ€™ve said since the founding of CrowdStrike: โ€œYou donโ€™t have a malware problem, you have an adversary problem.โ€ Protection starts by unmasking the threat actors targeting your organization. Who are they? What are they after? And most importantly, how can you defend against them?

CrowdStrike answers these questions and more in the new Adversary Universe podcast. Hosted by CrowdStrike SVP of Intelligence Adam Meyers and Field CTO of the Americas Cristian Rodriguez, the podcast will deliver a deep understanding of adversaries and their motivations and evolving tactics so organizations can better protect themselves.ย ย ย 

โ€œThereโ€™s a human behind this attack,โ€ Adam says in the first episode of the Adversary Universe podcast. โ€œAnd if you understand who those humans are, how they operate, and what theyโ€™re after, then you can defend your business.โ€ย 

New episodes will be released on a bi-weekly basis every other Thursday on Spotify, Google Podcasts, Apple Podcasts, Amazon Music and the Adversary Universe podcast webpage.ย 

The first episode โ€” โ€œWho Is the Adversary?โ€ โ€” is available now. This episode introduces listeners to the podcast series and sheds light on the history of CrowdStrike and how we pioneered the concept of an adversary-focused approach to cybersecurity. It begins to tell the story of modern adversaries: who they are, how theyโ€™re tracked and why you should learn more about them. Tune in to learn about CrowdStrikeโ€™s early days, the origin of the name Fancy Bear, the importance of adversary intelligence and more.ย 

โ€œThere is a very big reason why overall awareness of these various tradecrafts and these campaigns โ€” and understanding who is responsible for these attacks โ€” is so important to your business,โ€ Cristian explains. โ€œYou shouldnโ€™t just ignore it because it doesnโ€™t directly impact you, or thereโ€™s a perception of lack of impact.โ€

Hereโ€™s a sneak peek of whatโ€™s coming in future episodes:

  • Cloud Is the New Battleground: Weโ€™ll explore how threat actors use the cloud to their advantage: how they breach cloud environments, the actions they take once theyโ€™re in, and the ways they use the cloud as a tool in their attacks.
  • Invisible Threats: Discovering, Tracking and Mitigating Vulnerabilities: How do you know when your software is vulnerable? How should you prioritize patching? What do you do when a patch isnโ€™t available? What is a zero-day? Tune in as we dive into the world of vulnerability intelligence.ย 
  • Have You Been Breached? Along with a guest from CrowdStrikeโ€™s incident response team, weโ€™ll share the warning signs that could indicate a breach has occurred, the immediate next steps to take, and why having the right data is essential to recovery.

Weโ€™re excited to launch this podcast and share CrowdStrikeโ€™s unparalleled threat intelligence and compelling insights with the world. New episodes will drop every two weeks starting today โ€” mark your calendars now!ย 

Additional Resourcesย 

โŒ
โŒ