CINXE.COM
Cybersecurity 101: Fundamentals of Cybersecurity Topics | CrowdStrike
<!DOCTYPE HTML> <html lang="en-US" hrefLang="en-US" data-wcmmode-disabled="true"> <head> <meta charset="UTF-8"/> <title>Cybersecurity 101: Fundamentals of Cybersecurity Topics | CrowdStrike</title> <meta name="description" content="Want to learn more about the fundamental principles of cybersecurity and how CrowdStrike defines them? You've come to the right place!"/> <meta name="template" content="crowdstrike-wp-content-page"/> <meta name="MobileOptimized" content="width"/> <meta name="HandheldFriendly" content="true"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta http-equiv="x-ua-compatible" content="ie=edge"/> <meta property="twitter:card" content="summary"/> <meta name="robots" content="index, follow"/> <script type="module"> window.RUM_BASE = window.origin; import { sampleRUM } from '/.rum/@adobe/helix-rum-js@%5E2/src/index.js'; window.hlx = window.hlx || {}; window.hlx.sampleRUM = sampleRUM; sampleRUM(); </script><link rel="canonical" href="https://www.crowdstrike.com/en-us/cybersecurity-101/"/> <link rel="alternate" href="https://www.crowdstrike.com/en-us/cybersecurity-101/" hreflang="en_US"/> <link rel="alternate" href="https://www.crowdstrike.com/en-us/cybersecurity-101/" hreflang="x-default"/> <link rel="alternate" href="https://www.crowdstrike.com/de-de/cybersecurity-101/" hreflang="de_DE"/> <link rel="alternate" href="https://www.crowdstrike.com/fr-fr/cybersecurity-101/" hreflang="fr_FR"/> <link rel="alternate" href="https://www.crowdstrike.com/ja-jp/cybersecurity-101/" hreflang="ja_JP"/> <meta name="og:title" content="Cybersecurity 101: Fundamentals of Cybersecurity Topics | CrowdStrike"/> <meta name="og:url" content="https://www.crowdstrike.com/en-us/cybersecurity-101/"/> <meta name="og:type" content="website"/> <meta name="og:site_name" content="CrowdStrike.com"/> <meta name="og:image" content="https://www.crowdstrike.com/content/dam/crowdstrike/www/en-us/wp/2021/03/cs-101-homepage.jpg"/> <meta name="og:description" content="Want to learn more about the fundamental principles of cybersecurity and how CrowdStrike defines them? You've come to the right place!"/> <meta name="og:locale" content="en-US"/> <meta name="article:modified_time" content="2024-12-18T17:52:23"/> <meta name="twitter:title" content="Cybersecurity 101: Fundamentals of Cybersecurity Topics | CrowdStrike"/> <meta name="twitter:description" content="Want to learn more about the fundamental principles of cybersecurity and how CrowdStrike defines them? You've come to the right place!"/> <meta name="twitter:image" content="https://www.crowdstrike.com/content/dam/crowdstrike/www/en-us/wp/2021/03/cs-101-homepage.jpg"/> <!-- OneTrust Cookies Consent Notice start for default --> <script type="text/javascript" src="https://cdn.cookielaw.org/consent/bee15b7c-b632-450e-9003-9c8b60b3b978/OtAutoBlock.js" data-cfasync="false"></script> <script src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-document-language="true" type="text/javascript" charset="UTF-8" data-domain-script="bee15b7c-b632-450e-9003-9c8b60b3b978" data-cfasync="false"> </script> <script type="text/javascript" data-cfasync="false"> function OptanonWrapper() { } </script> <!-- OneTrust Cookies Consent Notice end for default --> <script type="text/javascript" data-cfasync="false"> !function(e,a,n,t){var i=e.head;if(i){ if (a) return; var o=e.createElement("style"); o.id="alloy-prehiding",o.innerText=n,i.appendChild(o),setTimeout(function(){o.parentNode&&o.parentNode.removeChild(o)},t)}} (document, document.location.href.indexOf("adobe_authoring_enabled") !== -1, "[data-target-location='true'] { opacity: 0 !important}", 3000); </script> <script type="text/javascript" src="//assets.adobedtm.com/d72cd986aea0/f7467a554824/launch-d9bfd4283ab8.min.js" async data-cfasync="false"></script> <!-- Initialize Analytics JS --> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-global-analytics.lc-74d86796e166385faae715f20b23e867-lc.min.js"></script> <!-- load base css --> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-grid.lc-d75b4ada966a12a0acc4f4483174f716-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-base.lc-61e1f474009a3adcff6cc95dde2309a3-lc.min.css" type="text/css"> <!-- Initialize Language Direction --> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-language.lc-4418ee9ad99afc3c80f14f47d372a699-lc.min.js"></script> <!-- TODO - Determine how we can preload this --> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-fonts.lc-475459b8ddb225de7aad82eaf0d465c8-lc.min.css" type="text/css"> <script src="/etc.clientlibs/clientlibs/granite/jquery.lc-f9e8e8c279baf6a1a278042afe4f395a-lc.min.js"></script> <script src="/etc.clientlibs/clientlibs/granite/utils.lc-899004cc02c33efc1f6694b1aee587fd-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-dependencies.lc-bb1dbdd53e32240429436d11ecb5f036-lc.min.js"></script> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-dependencies.lc-2929dd9d69a653da2cf8fe429017e6b6-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-common.lc-bfee363253e564749421aee81b977690-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-header.lc-d391668d55c91f914af6a1dfe163c38e-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-addsearch.lc-de23ed8a23f12eddd605ddc6e0d4a254-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-dotcom.lc-1b4992907a1c67e3501406a4160b785b-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-wp.lc-2487188ada5a39be760c58a1cf767759-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-wp-fonts.lc-9d825acd2674ee2606e257c1733f21ed-lc.min.css" type="text/css"> <link rel="icon" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-common/resources/favicon.ico"/> <!-- SEO SCHEMA --> </head> <body class="page_blogs page basicpage" data-disable-alertbar="false" data-alertbar-xf="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/alert/master" data-start-gradient="#EC0000" data-end-gradient="#1F60A2" data-product-promo-enabled="true"> <!-- <script async="async" type="text/javascript" src="https://addsearch.com/js/?key=7737a29b854de71521b1cd72c4118cfc"></script> --> <div class="cmp-addsearch"> <input type="hidden" name="as_key" value="7737a29b854de71521b1cd72c4118cfc"/> <input type="hidden" name="as_domain" value="addsearch.com"/> </div> <div style="display: none;"> </div> <div class="container-wp"> <div id="container-711058700f" class="cmp-container-wp" data-cmp-is="responsive-grid-container"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="experiencefragment aem-GridColumn aem-GridColumn--default--12"> <div id="experiencefragment-c59e360539" class="cmp-experiencefragment cmp-experiencefragment--header" data-target-location="false"> <div id="container-8c8cb9e6aa" class="cmp-container" data-cmp-is="responsive-grid-container"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="container responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div id="container-409a4789e3" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false"> <div class="container responsivegrid container--centered"> <div id="container-c8941e66cf" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false"> <div class="embed"> <div data-cmp-data-layer="{"embed-9589e40d12":{"@type":"crowdstrike/components/content/embed/v1/embed","repo:modifyDate":"2025-02-13T17:16:24Z"}}" id="embed-9589e40d12" class="cmp-embed" data-target-location="false"> <a class="header-skip-to-content" href="#main-container"> <span class="header-skip-to-content__text">Skip to Main Content</span> <span class="header-skip-to-content__svg"></span> </a> </div> </div> </div> </div> <div class="ghost"> </div> <div class="ghost"> </div> <div class="ghost"> </div> <div class="container responsivegrid container--centered container--flex container--horizontal-end container--vertical-center container--hide-small-desktop"> <div id="container-5adc3a33e7" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="list list--header-utility-nav"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-utility"> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/services/experienced-a-breach/"> <span class="cmp-list__item-link__text"> Experienced a breach?</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/blog/"> <span class="cmp-list__item-link__text"> Blog</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/contact-us/"> <span class="cmp-list__item-link__text"> Contact us</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="tel:18885128906"> <span class="cmp-list__item-link__text"> 1-888-512-8906</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> <div class="container responsivegrid container--dotcom-header--sticky"> <div id="container-2c0aa56535" class="cmp-container" data-cmp-is="simple-container" color-palette-background-color="#FFFFFF" data-is-transparent-header="false" data-target-location="false"> <div class="container responsivegrid container--centered container--flex container--horizontal-space-between container--vertical-center"> <div id="container-6612855e8e" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="container responsivegrid container--flex container--vertical-center"> <div id="container-f26b564fd9" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="container responsivegrid container--hide-small-desktop"> <div id="container-3f2ee3bee1" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="image image--cs-header-logo"> <div data-cmp-is="image" data-cmp-dmimage data-asset-id="d1c3eee8-948a-43b2-b54d-4079f21d919e" data-title="CrowdStrike Logo" id="nav-logo" data-cmp-hook-image="imageV3" class="cmp-image" itemscope itemtype="http://schema.org/ImageObject" data-target-location="false"> <a class="cmp-image__link" href="/content/crowdstrike-www/language-masters/global/en.html" title="CrowdStrike Logo" data-title="CrowdStrike Logo" target="_self"> <img src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/black-primary-crowdstrike-logo-1-addedPadding-3?ts=1739518077731&dpr=off" class="cmp-image__image" itemprop="contentUrl" loading="lazy" alt="CrowdStrike Logo"/> <svg class="cmp-image__play-icon__image-alt"> <use href="#play-alt" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#play-alt"></use> </svg> </a> </div> <div style="display: none;"> </div> </div> </div> </div> <div class="dotcomheader dotcomheader--redesign"> <div class="header-nav-desktop" data-cmp-is="header-nav-desktop" id="dotcomheader-en-us-02-14-2025" data-target-location="false"> <ul class="header-nav-desktop__nav-link-list"> <li class="header-nav-desktop__nav-link-list__item"> <button class="header-nav-desktop__nav-link-list__item__button linktoXF" data-dotcom-desktop-header="nav-link" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/platform/platform-redesign" data-id="nav-mega-menu-platform">Platform</button> </li> <li class="header-nav-desktop__nav-link-list__item"> <button class="header-nav-desktop__nav-link-list__item__button linktoXF" data-dotcom-desktop-header="nav-link" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/services/services-redesign" data-id="nav-mega-menu-services">Services</button> </li> <li class="header-nav-desktop__nav-link-list__item"> <button class="header-nav-desktop__nav-link-list__item__button linktoXF" data-dotcom-desktop-header="nav-link" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/why-crowdstrike/why-crowdstrike-redesign" data-id="nav-mega-menu-why-crowdstrike">Why CrowdStrike</button> </li> <li class="header-nav-desktop__nav-link-list__item"> <button class="header-nav-desktop__nav-link-list__item__button linktoXF" data-dotcom-desktop-header="nav-link" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/Resources/master" data-id="nav-mega-menu-resources">Resources</button> </li> <li class="header-nav-desktop__nav-link-list__item"> <a class="header-nav-desktop__nav-link-list__item__button" data-dotcom-desktop-header="nav-link" data-id="nav-mega-menu-pricing" href="https://www.crowdstrike.com/en-us/products/">Pricing</a> </li> </ul> </div> <div style="display: none;"> </div> </div> <div class="container responsivegrid container--flex container--vertical-center container--hide-large-desktop"> <div id="container-4a008ca7a3" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="image image--cs-header-logo-mobile"> <div data-cmp-is="image" data-cmp-dmimage data-asset-id="f823ebcf-6c27-4001-b740-6078a9a42ecd" data-title="CrowdStrike Logo" data-width="31" data-height="24" id="nav-logo-mobile" data-cmp-hook-image="imageV3" class="cmp-image" itemscope itemtype="http://schema.org/ImageObject" data-target-location="false"> <a class="cmp-image__link" href="https://crowdstrike.com" title="CrowdStrike Logo" data-title="CrowdStrike Logo" target="_self"> <img src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/CS_Logo_Falcon?ts=1739476101056&dpr=off" class="cmp-image__image" itemprop="contentUrl" loading="lazy" alt="CrowdStrike Logo"/> <svg class="cmp-image__play-icon__image-alt"> <use href="#play-alt" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#play-alt"></use> </svg> </a> </div> <div style="display: none;"> </div> </div> </div> </div> </div> </div> <div class="container responsivegrid container--flex container--vertical-center"> <div id="container-7df871cb5a" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="embed"> <div data-cmp-data-layer="{"embed-477b3975c2":{"@type":"crowdstrike/components/content/embed/v1/embed","repo:modifyDate":"2025-02-11T19:54:18Z"}}" id="embed-477b3975c2" class="cmp-embed" data-target-location="false"> <div data-cmp-is="add-search" id="search-header"> <button class="search_btn search_btn--redesign"> <img src="https://www.crowdstrike.com/content/dam/crowdstrike/marketing/en-us/images/graphics-and-illustrations/marketplace/addsearch-icon.svg" width="20" height="20" alt="Search Icon"/> </button> <div class="modal-addsearch"> <span class="modal-addsearch__close"></span> <div class="modal-addsearch__content"> <div class="widget widget--addsearch"> <div class="widget__searchfield" id="searchfield"></div> <div class="modal-addsearch__scroll-box"> <div class="widget__results" id="results"></div> <div class="widget__load-more" id="loadMore"></div> </div> </div> </div> </div> </div> </div> </div> <div class="eventscalendar"> <div class="cmp-events-calendar" id="nav-mega-menu-calendar" data-cmp-is="events-calendar" data-target-location="false"> <button class="cmp-events-calendar__button" data-cmp-hook-events-calendar="calendar-button"> <svg class="cmp-events-calendar__button__icon"> <use href="#calendar" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#calendar"></use> </svg> <span class="cmp-events-calendar__button__count"> 3 </span> </button> <div class="cmp-events-calendar__dialog" data-cmp-hook-events-calendar="dialog" role="dialog" aria-labelledby="nav-mega-menu-calendar-title"> <button class="cmp-events-calendar__dialog__close" aria-label="Close dialog" data-cmp-hook-events-calendar="close"> <svg class="cmp-events-calendar__dialog__close__icon"> <use href="#close-x" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#close-x"></use> </svg> </button> <p id="nav-mega-menu-calendar-title" class="cmp-events-calendar__dialog__title">Upcoming events</p> <ul class="cmp-events-calendar__dialog__events" data-cmp-hook-events-calendar="events"> <li class="cmp-events-calendar__dialog__events__event"> <a href="https://www.crowdstrike.com/events/fal-con-gov/" class="cmp-events-calendar__dialog__events__event__link"> <div class="cmp-events-calendar__dialog__events__event__link__date"> <div class="cmp-events-calendar__dialog__events__event__link__date__month">Feb</div> <div class="cmp-events-calendar__dialog__events__event__link__date__day">27</div> </div> <div class="cmp-events-calendar__dialog__events__event__link__content"> <p class="cmp-events-calendar__dialog__events__event__link__content__eyebrow">Conference</p> <p class="cmp-events-calendar__dialog__events__event__link__content__title">Fal.Con Gov 2025</p> <p class="cmp-events-calendar__dialog__events__event__link__content__location">Washington, DC</p> </div> <svg class="cmp-events-calendar__dialog__events__event__link__icon"> <use href="#chevron-right-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-red"></use> </svg> </a> </li> <li class="cmp-events-calendar__dialog__events__event"> <a href="https://www.crowdstrike.com/events/crowdtour/" class="cmp-events-calendar__dialog__events__event__link"> <div class="cmp-events-calendar__dialog__events__event__link__date"> <div class="cmp-events-calendar__dialog__events__event__link__date__month">Apr</div> <div class="cmp-events-calendar__dialog__events__event__link__date__day">2</div> </div> <div class="cmp-events-calendar__dialog__events__event__link__content"> <p class="cmp-events-calendar__dialog__events__event__link__content__eyebrow">Conference</p> <p class="cmp-events-calendar__dialog__events__event__link__content__title">CrowdTour 2025</p> <p class="cmp-events-calendar__dialog__events__event__link__content__location">Find a city near you</p> </div> <svg class="cmp-events-calendar__dialog__events__event__link__icon"> <use href="#chevron-right-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-red"></use> </svg> </a> </li> <li class="cmp-events-calendar__dialog__events__event"> <a href="https://www.crowdstrike.com/events/fal-con/" class="cmp-events-calendar__dialog__events__event__link"> <div class="cmp-events-calendar__dialog__events__event__link__date"> <div class="cmp-events-calendar__dialog__events__event__link__date__month">Sep</div> <div class="cmp-events-calendar__dialog__events__event__link__date__day">15</div> </div> <div class="cmp-events-calendar__dialog__events__event__link__content"> <p class="cmp-events-calendar__dialog__events__event__link__content__eyebrow">Conference</p> <p class="cmp-events-calendar__dialog__events__event__link__content__title">Fal.Con 2025</p> <p class="cmp-events-calendar__dialog__events__event__link__content__location">Las Vegas, NV</p> </div> <svg class="cmp-events-calendar__dialog__events__event__link__icon"> <use href="#chevron-right-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-red"></use> </svg> </a> </li> </ul> <div class="cmp-teaser__action-container cmp-teaser__action-container-mobile"> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link " href="https://crowdstrike.com/events/" color-palette-text-color="#000000" color-palette-text-hover-color="#000000" data-cmp-hook-action="action"> View all events <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon"> <use href="#chevron-right-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-red"></use> </svg> </a> </div> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="container responsivegrid container--hide-small-desktop"> <div id="container-724530e91d" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="list list--dotcom-header-links-noText--redesign"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-login-header"> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://www.crowdstrike.com/en-us/login/"> <img class="cmp-list__item-link__icon" src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/login-icon" alt="Login"/> <span class="cmp-list__item-link__text"> Login</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> <div class="cart cart--redesign"> <div class="cmp-cart cmp-cart--hide" data-cmp-is="cart" data-product-swap-modal="nav-cart-modal" data-checkout-url="https://marketplace.crowdstrike.com" id="nav-cart"> <button class="cmp-cart__button" data-cmp-hook-cart="menu-button" aria-label="Empty Cart Icon"> <img class="cmp-cart__button__empty" src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/shopping-cart-empty" data-cmp-hook-cart="empty-icon" alt="cart icon"/> <img class="cmp-cart__button__not-empty" src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/shopping-cart-empty" data-cmp-hook-cart="cart-with-items-icon" alt="cart icon"/> <span class="cmp-cart__button__quantity" data-cmp-hook-cart="cart-quantity"></span> </button> <div class="cmp-cart__wrapper" data-cmp-hook-cart="wrapper"> <div class="cmp-cart__target-top" data-cmp-hook-cart="target-container-top"></div> <button class="cmp-cart__wrapper__close-button" data-cmp-hook-cart="close"> <svg class="cmp-cart__wrapper__close-button__icon"> <use href="#close-x" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#close-x"></use> </svg> </button> <div class="cmp-cart__wrapper__header"> <!-- Mark To be shown when a item is added --> <svg class="cmp-cart__wrapper__header__mark" data-cmp-hook-cart="header-added-mark"> <use href="#product-added-check" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#Product-added"></use> </svg> <p class="cmp-cart__wrapper__header__title" data-cmp-hook-cart="title">Your Cart</p> <p class="cmp-cart__wrapper__header__added-title" data-cmp-hook-cart="added-title">Added to Cart</p> </div> <div id="separator-nav-cart" class="cmp-separator" data-is-vertical="false" data-cmp-is="separator" data-target-location="false"> <hr data-cmp-hook-separator="hr" class="cmp-separator__horizontal-rule"/> </div> <!-- When cart is empty --> <div class="cmp-cart__wrapper__empty-cart" data-cmp-hook-cart="empty-cart"> <img class="cmp-cart__wrapper__empty-cart__image" height="64" width="64" src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/empty-cart-image"/> <p class="cmp-cart__wrapper__empty-cart__text">There's nothing in your cart</p> <div class="cmp-cart__action-container-empty"> <div class="cmp-teaser__action-container" data-cmp-hook-teaser="actions"> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link " href="/content/crowdstrike-www/locale-sites/us/en-us/products" color-palette-text-color="#000000" color-palette-border-color="#FFFFFF" color-palette-background-color="#FFFFFF" color-palette-text-hover-color="#000000" color-palette-border-hover-color="#FFFFFF" color-palette-background-hover-color="#FFFFFF" data-snowflake-event="exploreproducts" data-cmp-hook-action="action"> Explore products <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon"> <use href="#chevron-right-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-red"></use> </svg> </a> </div> </div> </div> </div> <!-- When cart is not empty --> <div class="cmp-cart__wrapper__content" data-cmp-hook-cart="cart-item"> <div class="cmp-cart__wrapper__content__image"> <img class="cmp-cart__wrapper__content__image__svg" data-cmp-hook-cart="product-image"/></img> </div> <div class="cmp-cart__wrapper__content__description"> <div class="cmp-cart__wrapper__content__description__product"> <p class="cmp-cart__wrapper__content__description__product__name" data-cmp-hook-cart="product-name"></p> <p class="cmp-cart__wrapper__content__description__product__price-per-year" data-cmp-hook-cart="price-per-year"></p> <p class="cmp-cart__wrapper__content__description__product__term">per endpoint / per year</p> </div> <div class="cmp-cart__wrapper__content__description__product-price"> <span class="cmp-cart__wrapper__content__description__product-price__fresh-text" data-cmp-hook-cart="fresh-price"></span> <span class="cmp-cart__wrapper__content__description__product-price__discout-text" data-cmp-hook-cart="discount-price"></span> <p class="cmp-cart__wrapper__content__description__product-price__text" data-cmp-hook-cart="total-price"></p> <div class="cmp-cart__wrapper__content__description__product-price__controls"> <button class="cmp-cart__wrapper__content__description__product-price__controls__product-counter decrement-counter" data-cmp-hook-cart="decrement">-</button> <span class="cmp-cart__wrapper__content__description__product-price__controls__product-quantity" data-cmp-hook-cart="quantity"></span> <button class="cmp-cart__wrapper__content__description__product-price__controls__product-counter increment-counter" data-cmp-hook-cart="increment">+</button> <button class="cmp-cart__wrapper__content__description__product-price__controls__product-delete" data-cmp-hook-cart="remove"> <svg class="cmp-cart__wrapper__content__description__product-price__controls__product-delete__image"> <use href="#delete" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#delete"></use> </svg> </button> </div> </div> </div> </div> <div class="cmp-cart__action-container" data-cmp-hook-cart="actions"> <div data-cmp-hook-cart="teaser"> <div class="cmp-teaser__action-container" data-cmp-hook-teaser="actions"> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link " href="#checkout" color-palette-text-color="#FFFFFF" color-palette-border-color="#EC0000" color-palette-background-color="#EC0000" color-palette-text-hover-color="#FFFFFF" color-palette-border-hover-color="#D30000" color-palette-background-hover-color="#D30000" data-snowflake-event="vieworder" data-cmp-hook-action="action"> View Order{cartSize} <svg class="cmp-teaser__action-link__internal-icon "> <use href="#cta-arrow-white" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> </a> </div> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link " href="/content/crowdstrike-www/locale-sites/us/en-us/products" color-palette-text-color="#000000" color-palette-border-color="#FFFFFF" color-palette-background-color="#FFFFFF" color-palette-text-hover-color="#000000" color-palette-border-hover-color="#FFFFFF" color-palette-background-hover-color="#FFFFFF" data-snowflake-event="continueshopping" data-cmp-hook-action="action"> Continue Shopping <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon"> <use href="#chevron-right-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-red"></use> </svg> </a> </div> </div> </div> </div> <div class="cmp-cart__target-bottom" data-cmp-hook-cart="target-container-bottom"></div> </div> <div class="cmp-cart__loading-screen" data-cmp-hook-cart="loading-screen"> <div class="cmp-cart__loading-screen__container"> <svg class="cmp-cart__loading-screen__container__icon"> <use href="#cart-spinner" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cart-spinner"></use> </svg> <p class="cmp-cart__loading-screen__container__text">Updating cart...</p> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="container responsivegrid container--hide-small-desktop"> <div id="container-3897c11d80" class="cmp-container" data-cmp-is="simple-container" data-padding-left="16" data-padding-left-tablet="16" data-padding-left-mobile="16" data-is-transparent-header="false" data-target-location="false"> <div class="button button--cs-sans"> <a id="nav-cta-desktop" class="cmp-button " href="https://www.crowdstrike.com/products/trials/try-falcon-prevent/" data-cmp-clickable data-cmp-is="button-custom" color-palette-border-color="#EC0000" color-palette-background-color="#EC0000" color-palette-border-hover-color="#D30000" color-palette-background-hover-color="#D30000" data-target-location="false"> <span class="cmp-button__text" color-palette-text-color="#FFFFFF" color-palette-text-hover-color="#FFFFFF"> <svg class="cmp-button__text__back-icon"> <use href="#cta-arrow-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-red"></use> </svg> <svg class="cmp-button__text__back-icon--rtl"> <use href="#cta-arrow-red-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-red-left"></use> </svg> Start free trial <svg class="cmp-button__text__internal-icon"> <use href="#cta-arrow-white" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white"></use> </svg> <svg class="cmp-button__text__internal-icon--rtl"> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> <svg class="cmp-button__text__external-icon"> <use href="#external-link" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#external-link"></use> </svg> </span> <div style="display: none;"> </div> </a> </div> </div> </div> <div class="dotcomheader dotcomheader--redesign"> <div class="header-nav-tablet-mobile" data-cmp-is="header-nav-tablet-mobile" id="dotcomheader-en-us-02-13-2025" data-target-location="false"> <button class="header-nav-tablet-mobile__hamburger" data-dotcom-tablet-mobile-header="hamburger"></button> <div class="header-nav-tablet-mobile__hamburger-menu" data-dotcom-tablet-mobile-header="menu"> <ul class="header-nav-tablet-mobile__hamburger-menu__accordion" id="mobileNav"> <hr class="header-nav-tablet-mobile__hamburger-menu__accordion__item__separator"/> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item"> <button class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button" data-dotcom-tablet-mobile-header="accordion-item" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/platform/platform-redesign" data-id="nav-mega-menu-platform"> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__text">Platform</span> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__svg"></span> </button> <hr class="header-nav-tablet-mobile__hamburger-menu__accordion__item__separator-gradient"/> </li> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item"> <button class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button" data-dotcom-tablet-mobile-header="accordion-item" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/services/services-redesign" data-id="nav-mega-menu-services"> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__text">Services</span> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__svg"></span> </button> <hr class="header-nav-tablet-mobile__hamburger-menu__accordion__item__separator-gradient"/> </li> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item"> <button class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button" data-dotcom-tablet-mobile-header="accordion-item" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/why-crowdstrike/why-crowdstrike-redesign" data-id="nav-mega-menu-why-crowdstrike"> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__text">Why CrowdStrike</span> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__svg"></span> </button> <hr class="header-nav-tablet-mobile__hamburger-menu__accordion__item__separator-gradient"/> </li> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item"> <button class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button" data-dotcom-tablet-mobile-header="accordion-item" data-xf-path="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/Resources/master" data-id="mega-menu-resources"> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__text">Resources</span> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__svg"></span> </button> <hr class="header-nav-tablet-mobile__hamburger-menu__accordion__item__separator-gradient"/> </li> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item"> <a class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button" href="/content/crowdstrike-www/language-masters/global/en/products" data-id="nav-mega-menu-pricing"> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__text">Pricing</span> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__button__svg"></span> </a> <hr class="header-nav-tablet-mobile__hamburger-menu__accordion__item__separator-gradient"/> </li> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link--first"> <a href="/content/crowdstrike-www/language-masters/global/en/login" class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link"> <img src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/login-icon" class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link__img"/> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link__text">Login</span> </a> </li> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link "> <a href="/en-us/services/experienced-a-breach/" class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link"> <img src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/experience-breach-Icon" class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link__img"/> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link__text">Experienced a breach?</span> </a> </li> <li class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link "> <a href="/en-us/contact-us/" class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link"> <img src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/phone-icon" class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link__img"/> <span class="header-nav-tablet-mobile__hamburger-menu__accordion__item__utility-link__link__text">Contact us</span> </a> </li> <!-- Subnav and Mobile Optional CTA --> <div class="cmp-teaser__action-container cmp-teaser__action-container-mobile"> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link " href="https://www.crowdstrike.com/products/trials/try-falcon-prevent" color-palette-text-color="#FFFFFF" color-palette-border-color="#EC0000" color-palette-background-color="#EC0000" color-palette-text-hover-color="#FFFFFF" color-palette-border-hover-color="#D30000" color-palette-background-hover-color="#D30000" data-cmp-hook-action="action"> Start free trial <svg class="cmp-teaser__action-link__internal-icon "> <use href="#cta-arrow-white" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> </a> </div> </div> </ul> <div class="header-nav-tablet-mobile__hamburger-menu__glass-pane"></div> </div> <div class="header-nav-tablet-mobile__xf-menu" data-dotcom-tablet-mobile-header="xf-menu"> <div class="header-nav-tablet-mobile__xf-menu__header"> <button class="header-nav-tablet-mobile__xf-menu__header__back-button" data-dotcom-tablet-mobile-header="xf-back"> <span class="header-nav-tablet-mobile__xf-menu__header__back-button__svg"></span> <span class="header-nav-tablet-mobile__xf-menu__header__back-button__text">Back</span> </button> <button class="header-nav-tablet-mobile__xf-menu__header__close-button" data-dotcom-tablet-mobile-header="xf-close"></button> </div> <div class="header-nav-tablet-mobile__xf-menu__container" data-dotcom-tablet-mobile-header="xf-container"></div> </div> </div> <div style="display: none;"> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="container-wp aem-GridColumn aem-GridColumn--default--12"> <div id="main-container" class="cmp-container-wp" data-cmp-is="simple-container" data-is-transparent-header="false"> <div class="container-wp"> <div id="container-cddacb099c" class="cmp-container-wp" data-cmp-is="simple-container" data-is-transparent-header="false"> <div class="banner"> <div class="cmp-wp-listing-page-banner" style="background-image: url('https://assets.crowdstrike.com/is/content/crowdstrikeinc/hero-banner-cs101-2'); no-repeat center top,#000; background-size:contain;" id="banner-en-us-12-18-2024" data-target-location="false"> <div class="container"> <div class="row justify-content-center"> <div class="col-lg-11"> <h1 class="textcenter caps white_c">CYBERSECURITY 101:<br /> THE FUNDAMENTALS OF CYBERSECURITY</h1> <h4 class="textcenter white" data-uw-rm-heading="level" role="heading" aria-level="3"><p>Cybersecurity is becoming increasingly important in today’s world. CrowdStrike is providing explanations, examples and best practices on fundamental principles of a variety of cybersecurity topics. If you're looking for information on endpoint protection, cloud security, types of cyber attacks and more, you’ve come to the right place – welcome to Cybersecurity 101!</p></h4> </div> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="cybersecurityfilter"> <div class="cmp-wp-cyber-security-filter filterBar" id="cybersecurityfilter-en-us-12-18-2024"> <div class="container"> <div class="row"> <div class="col-12"> <div class="search-filter"> <input id="searchFilter" class="search-filter__input" cs-search="" placeholder="Search..."/> </div> </div> <div class="col-12"> <div class="anchorNavigation dropDown"> <button id="viewAnchors" class="dropDown__button" view_all="false"></button> <ul class="dropDown__list anchorNavigation__list" view_all="ready"> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="a" href="#a" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#a">a</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="b" href="#b" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#b">b</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="c" href="#c" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#c">c</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="d" href="#d" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#d">d</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="e" href="#e" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#e">e</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="f" href="#f" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#f">f</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="g" href="#g" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#g">g</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="h" href="#h" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#h">h</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="i" href="#i" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#i">i</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="j" href="#j" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#j">j</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="k" href="#k" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#k">k</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="l" href="#l" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#l">l</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="m" href="#m" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#m">m</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="n" href="#n" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#n">n</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="o" href="#o" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#o">o</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="p" href="#p" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#p">p</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="q" href="#q" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#q">q</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="r" href="#r" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#r">r</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="s" href="#s" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#s">s</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="t" href="#t" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#t">t</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="u" href="#u" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#u">u</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="v" href="#v" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#v">v</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="w" href="#w" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#w">w</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="x" href="#x" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#x">x</a></li> <li class="anchorNavigation__list_item dropDown__list_item" element-view="hidden"><a class="anchorNavigation__list_item_link" data-target="z" href="#z" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="#z">z</a></li> </ul> </div> </div> <div class="col-md-10"> <div class="dropDown categoryFilter"> <p class="categoryFilter__list_title">Filter Category</p> <button id="filterCategory" class="dropDown__button" view_all="false"></button> <div id="singleSelectFilter" class="dropDown__list categoryFilter__list" view_all="ready"> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Small Business" element-view="hidden">Small Business</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Threat Intelligence & Hunting" element-view="hidden">Threat Intelligence & Hunting</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Next-Gen SIEM" element-view="hidden">Next-Gen SIEM</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Cyberattacks" element-view="hidden">Cyberattacks</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Exposure Management" element-view="hidden">Exposure Management</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Cloud Security" element-view="hidden">Cloud Security</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Identity Protection" element-view="hidden">Identity Protection</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Data Protection" element-view="hidden">Data Protection</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Platform Security" element-view="hidden">Platform Security</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="AI & Machine Learning" element-view="hidden">AI & Machine Learning</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Endpoint Security & XDR" element-view="hidden">Endpoint Security & XDR</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Incident Response" element-view="hidden">Incident Response</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="IT Automation" element-view="hidden">IT Automation</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Application Security" element-view="hidden">Application Security</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Advisory Services" element-view="hidden">Advisory Services</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Managed Security" element-view="hidden">Managed Security</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Observability" element-view="hidden">Observability</div> <div class="categoryFilter__list_item dropDown__list_item" data-filter-value="Social Engineering" element-view="hidden">Social Engineering</div> </div> </div> </div> <div class="container"> <div id="filterContent" class="row filterContent__wrapper"> <div class="col-md-10"> <div id="a" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">A</span> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/attack-vector/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/attack-vector.html"> <span class="article__title-text">Attack Vectors</span><span class="posts__title-link">Read More ></span> </a> <p>An attack vector is the method or combination of methods that cybercriminals use to breach or infiltrate a victim’s network. </p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/advanced-persistent-threat-apt/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/advanced-persistent-threat-apt.html"> <span class="article__title-text">Advanced Persistent Threat (APT)</span><span class="posts__title-link">Read More ></span> </a> <p>An advanced persistent threat (APT) is a sophisticated, sustained cyberattack in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time. </p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/ai-pc/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/ai-pc.html"> <span class="article__title-text">AI PC</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we’ll cover AI PC use cases in cybersecurity specifically, and various challenges associated with these new machines.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/active-directory-ad-auditing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/active-directory-ad-auditing.html"> <span class="article__title-text">Active Directory (AD) Auditing</span><span class="posts__title-link">Read More ></span> </a> <p>AD auditing is the process of tracking, logging, and reviewing activities in your Active Directory environment. Whether it’s detecting risky environment changes, monitoring privilege escalations, or meeting compliance requirements, auditing your AD setup and activity gives you the insights you need to secure your network. Think of it as the detective work that ensures your AD environment stays clean, compliant, and resilient to threats.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/active-directory-federation-service-adfs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/active-directory-federation-service-adfs.html"> <span class="article__title-text">Active Directory Federation Services (AD FS)</span><span class="posts__title-link">Read More ></span> </a> <p>Active Directory Federation Services (AD FS) is a single sign on (SSO) feature developed by Microsoft that provides authenticated access to any domain, device, web application or system within the organization’s active directory (AD). </p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/advanced-endpoint-protection-aep/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/advanced-endpoint-protection-aep.html"> <span class="article__title-text">Advanced Endpoint Protection (AEP)</span><span class="posts__title-link">Read More ></span> </a> <p>Advanced endpoint protection (AEP) is a next-generation endpoint security solution that uses AI, machine learning, and other intelligent automation capabilities to provide more comprehensive cybersecurity protection from a variety of modern threats.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/active-directory-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/active-directory-security.html"> <span class="article__title-text">Active Directory Security</span><span class="posts__title-link">Read More ></span> </a> <p>Active Directory is a directory service offered by Microsoft Windows that helps administrators configure permissions and network access.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/ai-native-xdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/ai-native-xdr.html"> <span class="article__title-text">AI-Native XDR</span><span class="posts__title-link">Read More ></span> </a> <p>The synergy between XDR and AI introduces a powerhouse solution — AI-native XDR — that offers a myriad of benefits to organizations.</p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/application-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/application-security.html"> <span class="article__title-text">Application Security</span><span class="posts__title-link">Read More ></span> </a> <p>Application security is a set of measures designed to prevent data or code at the application level from being stolen or manipulated. It involves security during application development and design phases as well as systems and approaches that protect applications after deployment.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/api-security-testing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/api-security-testing.html"> <span class="article__title-text">API Security Testing</span><span class="posts__title-link">Read More ></span> </a> <p>API security testing helps teams address vulnerabilities early and often throughout the API development process. </p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/application-security/application-security-posture-management-aspm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/application-security/application-security-posture-management-aspm.html"> <span class="article__title-text">Application Security Posture Management (ASPM)</span><span class="posts__title-link">Read More ></span> </a> <p>ASPM is the process of evaluating, managing, and enhancing the security posture of an organization's custom applications. It ensures applications adhere to security standards, resist cyber threats, and remain compliant.</p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/aspm-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/aspm-best-practices.html"> <span class="article__title-text">ASPM Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>Read this post to learn about five ASPM best practices that will help keep your application environments secure from adversaries. </p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/aspm-use-cases/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/aspm-use-cases.html"> <span class="article__title-text">Application Security Posture Management (ASPM) Use Cases</span><span class="posts__title-link">Read More ></span> </a> <p>There are many real-world scenarios where ASPM plays a crucial role in helping organizations fortify their application security.</p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/application-security/asoc-vs-aspm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/application-security/asoc-vs-aspm.html"> <span class="article__title-text">ASOC vs. ASPM</span><span class="posts__title-link">Read More ></span> </a> <p>ASOC and ASPM share common foundations in application security, with ASOC often viewed as a precursor to the broader and more holistic ASPM approach.</p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/application-security/application-security-orchestration-and-correlation-asoc/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/application-security/application-security-orchestration-and-correlation-asoc.html"> <span class="article__title-text">Application Security Orchestration and Correlation (ASOC)</span><span class="posts__title-link">Read More ></span> </a> <p>By correlating data from multiple sources and analyzing patterns, ASOC tools enable security teams to de-duplicate and prioritize application security findings. Additionally, ASOC tools enable development teams to automate key workflows and streamline security processes, increasing speed and efficiency for vulnerability testing and remediation efforts.</p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/application-security/application-risk-scoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/application-security/application-risk-scoring.html"> <span class="article__title-text">Application Risk Scoring</span><span class="posts__title-link">Read More ></span> </a> <p>In this post we’ll provide a clearer understanding of risk scoring, discuss the role of Common Vulnerability Scoring System (CVSS) scores (and other scoring standards), and talk about what it means to integrate business and data flow context into your risk assessment.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/aws-migration/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/aws-migration.html"> <span class="article__title-text">AWS Migration</span><span class="posts__title-link">Read More ></span> </a> <p>An AWS migration is the strategic process of moving digital assets — such as applications, databases, and IT processes — from on-premises or other cloud services to Amazon Web Services (AWS).</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/automated-intelligence/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/automated-intelligence.html"> <span class="article__title-text">Automated Intelligence</span><span class="posts__title-link">Read More ></span> </a> <p>Learn more about how traditional defense measures have evolved to integrate automated systems that use AI/machine learning (ML) and data analytics and the role and benefits of automated intelligence as a part of a modern cybersecurity arsenal.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/ai-native-cybersecurity/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/ai-native-cybersecurity.html"> <span class="article__title-text">AI-Native Cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>AI-native cybersecurity uses cloud-native data platforms and cutting-edge AI to analyze datasets, identify patterns, and strengthen security posture.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/adversarial-ai-and-machine-learning/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/adversarial-ai-and-machine-learning.html"> <span class="article__title-text">Adversarial AI & ML</span><span class="posts__title-link">Read More ></span> </a> <p>Adversarial AI or adversarial machine learning (ML) seeks to inhibit the performance of AI/ML systems by manipulating or misleading them. These attacks on machine learning systems can occur at multiple stages across the model development life cycle.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/observability/azure-kubernetes-service-aks/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/azure-kubernetes-service-aks.html"> <span class="article__title-text">Azure Kubernetes Service (AKS)</span><span class="posts__title-link">Read More ></span> </a> <p>Azure Kubernetes Service (AKS) is a managed Kubernetes service from Microsoft Azure that aims to simplify the deployment and management of Kubernetes clusters.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/ai-powered-behavioral-analysis/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/ai-powered-behavioral-analysis.html"> <span class="article__title-text">AI-Powered Behavioral Analysis</span><span class="posts__title-link">Read More ></span> </a> <p>AI-powered behavioral analysis leverages artificial intelligence to learn and predict adversarial behavior patterns.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/aws-infrastructure-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/aws-infrastructure-monitoring.html"> <span class="article__title-text">AWS Infrastructure Observability</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we’ll cover the benefits of implementing infrastructure observability on AWS. We will explore a few key observability services from AWS, along with external services that you can integrate with your AWS account to enhance your monitoring capabilities.</p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/application-security/application-security-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/application-security/application-security-best-practices.html"> <span class="article__title-text">Application Security Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we will cover seven best practices that can ensure the resilience of your applications against ever-evolving threats.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/application-whitelisting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/application-whitelisting.html"> <span class="article__title-text">Application Whitelisting</span><span class="posts__title-link">Read More ></span> </a> <p>Application whitelisting is the approach of restricting the usage of any tools or applications only to those that are already vetted and approved.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/audit-logs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/audit-logs.html"> <span class="article__title-text">Audit Logs</span><span class="posts__title-link">Read More ></span> </a> <p>Audit logs are a collection of records of internal activity relating to an information system. Audit logs differ from application logs and system logs.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/aws-cloud-security-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/aws-cloud-security-best-practices.html"> <span class="article__title-text">AWS Cloud Security</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we go beyond the generic AWS best practices and offer recommendations to help you scale and enhance your AWS security.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/cloudtrail-vs-cloudwatch/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/cloudtrail-vs-cloudwatch.html"> <span class="article__title-text">AWS CloudTrail vs. AWS CloudWatch</span><span class="posts__title-link">Read More ></span> </a> <p>Amazon Web Services (AWS) offers various monitoring tools to assist users in monitoring their cloud systems. In this post, we’ll compare the AWS CloudTrail and AWS CloudWatch tools, exploring their key features, capabilities, differences, and similarities.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/access-logs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/access-logs.html"> <span class="article__title-text">Access Logs</span><span class="posts__title-link">Read More ></span> </a> <p>An access log is a log file that records all events related to client applications and user access to a resource on a computer. Examples can be web server access logs, FTP command logs, or database query logs.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/application-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/application-monitoring.html"> <span class="article__title-text">Application Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Application monitoring is the process of collecting log data in order to help developers track availability, bugs, resource use, and changes to performance in applications that affect the end-user experience (UX).</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/aws-misconfigurations/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/aws-misconfigurations.html"> <span class="article__title-text">AWS Misconfigurations</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we’ll explore the most common sets of misconfigurations across the most common services, and give advice on how to stay safe and prevent potential breaches when making any modification to your infrastructure</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/attack-surface/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/attack-surface.html"> <span class="article__title-text">Attack Surface</span><span class="posts__title-link">Read More ></span> </a> <p>An attack surface is the sum of all possible security risk exposures in an organization’s software environment.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/arp-spoofing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/arp-spoofing.html"> <span class="article__title-text">Address Resolution Protocol (ARP) Spoofing: What It Is and How to Prevent an ARP Attack</span><span class="posts__title-link">Read More ></span> </a> <p>Address Resolution Protocol (ARP) spoofing or ARP poisoning is a form of spoofing attack that hackers use to intercept data. A hacker commits an ARP spoofing attack by tricking one device into sending messages to the hacker instead of the intended recipient. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/attack-surface-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/attack-surface-management.html"> <span class="article__title-text">Attack Surface Management</span><span class="posts__title-link">Read More ></span> </a> <p>Attack surface management is the continuous discovery, monitoring, evaluation, prioritization and remediation of attack vectors within an organization's IT infrastructure.</p> </div> </div> <div id="b" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">B</span> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/browser-extensions/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/browser-extensions.html"> <span class="article__title-text">Browser Extensions</span><span class="posts__title-link">Read More ></span> </a> <p>Browser extensions—sometimes referred to as plug-ins or add-ons—are small software modules that enhance and personalize the functionality of web browsers, such as Chrome, Firefox, Edge, and Safari. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/behavioral-analytics/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/behavioral-analytics.html"> <span class="article__title-text">Behavioral Analytics</span><span class="posts__title-link">Read More ></span> </a> <p>In the context of cybersecurity, behavioral analytics focuses on user behavior within networks and applications, watching for unusual activity that may signify a security threat. </p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/bring-your-own-desk-byod/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/bring-your-own-desk-byod.html"> <span class="article__title-text">Bring-Your-Own-Device (BYOD)</span><span class="posts__title-link">Read More ></span> </a> <p>Bring Your Own Device (BYOD) refers to a business policy that allows employees to use personally owned devices for work purposes. Common personal devices include smartphones, laptops, tablets, and flash drives.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/backdoor-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/backdoor-attack.html"> <span class="article__title-text">Backdoor Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>A backdoor attack is a clandestine method of sidestepping normal authentication procedures to gain unauthorized access to a system. It’s like a secret entrance that a burglar can use to get into a house — but instead of a house, it’s a computer or a network.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/bootkits/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/bootkits.html"> <span class="article__title-text">Bootkit: Definition, Prevention, and Removal</span><span class="posts__title-link">Read More ></span> </a> <p>Bootkit is a type of malware used by a threat actor to attach malicious software to a computer system and can be a critical threat to your business.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/backporting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/backporting.html"> <span class="article__title-text">Backporting</span><span class="posts__title-link">Read More ></span> </a> <p>Backporting is when a software patch or update is taken from a recent software version and applied to an older version of the same software.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/brute-force-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/brute-force-attack.html"> <span class="article__title-text">Brute Force Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>A brute force attack is uses a trial-and-error approach to systematically guess login info, credentials, and encryption keys. The attacker submits combinations of usernames and passwords until they finally guess correctly.</p> </div> </div> <div id="c" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">C</span> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/cookie-logging/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/cookie-logging.html"> <span class="article__title-text">Cookie Logging</span><span class="posts__title-link">Read More ></span> </a> <p>Cookie logging is the process of collecting cookies from a user’s site session.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/continuous-threat-exposure-management-ctem/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/continuous-threat-exposure-management-ctem.html"> <span class="article__title-text">Continuous Threat Exposure Management (CTEM)</span><span class="posts__title-link">Read More ></span> </a> <p>Continuous threat exposure management (CTEM) is a framework for proactively managing and mitigating threat exposure through an iterative approach that emphasizes building structured organizational processes in addition to leveraging security tools. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/cyber-espionage/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/cyber-espionage.html"> <span class="article__title-text">Cyber Espionage</span><span class="posts__title-link">Read More ></span> </a> <p>Cyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons. </p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/conditional-access/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/conditional-access.html"> <span class="article__title-text">Conditional Access</span><span class="posts__title-link">Read More ></span> </a> <p>Conditional access (CA) is about control — deciding who gets access to which resources, when, and under what conditions. It’s a security strategy for organizations that tailors access based on real-time signals like user identity, device health, location, risk, and behavior patterns.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity.html"> <span class="article__title-text">Cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity is the act of defending digital assets, including networks, systems, computers and data, from cyberattacks. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/cyber-attacks-on-smbs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/cyber-attacks-on-smbs.html"> <span class="article__title-text">Cyberattacks on Small Businesses</span><span class="posts__title-link">Read More ></span> </a> <p>Many small businesses may still fall into the trap of thinking that their organization isn’t large enough or high-profile enough to be the target for attackers. But the fact of the matter is that they have become an easy mark since many do not have advanced tools to defend the business, but they do have what hackers are after: data.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-access-security-broker-casb/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-access-security-broker-casb.html"> <span class="article__title-text">Cloud Access Security Broker (CASB)</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud access security broker (CASB) is a security intermediary between cloud users and cloud-based applications.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security.html"> <span class="article__title-text">Cloud Security</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud security refers to a broad set of strategies and technologies designed to protect data, applications, and infrastructure hosted in the cloud.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/containerization/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/containerization.html"> <span class="article__title-text">Containerization</span><span class="posts__title-link">Read More ></span> </a> <p>Containerization is a software deployment technology that allows developers to package software and applications in code and run them in isolated compute environments as immutable executable images containing all the necessary files, configurations, libraries, and binaries needed to run that specific application.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-vulnerabilities/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-vulnerabilities.html"> <span class="article__title-text">Cloud Vulnerabilities</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud vulnerabilities are weaknesses, oversights, or gaps in cloud infrastructure that attackers can exploit to gain unauthorized access and cause harm. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cnapp-vs-cwpp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cnapp-vs-cwpp.html"> <span class="article__title-text">CNAPP vs CWPP</span><span class="posts__title-link">Read More ></span> </a> <p>Read this article to learn what the differences between CNAPP and CWPP and how they work together to improve cloud security. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/cyber-asset-attack-surface-management-caasm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/cyber-asset-attack-surface-management-caasm.html"> <span class="article__title-text">Cyber Asset Attack Surface Management (CAASM)</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-assessment/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-assessment.html"> <span class="article__title-text">Cloud Security Assessment</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud security assessment is an evaluation that tests and analyzes an organization’s cloud infrastructure to ensure the organization is protected from a variety of security risks and threats. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-native/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-native.html"> <span class="article__title-text">Cloud Native Security</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud native security is a collection of technologies and practices that comprehensively address the dynamic and complex needs of the modern cloud environment.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cdr-vs-cnapp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cdr-vs-cnapp.html"> <span class="article__title-text">CDR vs CNAPP</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-detection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-detection.html"> <span class="article__title-text">Cloud Detection</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud detection identifies threats, vulnerabilities, and malicious activities within an organization’s cloud infrastructure. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-native-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-native-security.html"> <span class="article__title-text">Cloud Native Security</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud native security is a collection of technologies and practices that comprehensively address the dynamic and complex needs of the modern cloud environment.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-firewall/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-firewall.html"> <span class="article__title-text">Cloud Firewall</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud firewall acts as a barrier between cloud servers and incoming requests by enforcing strict authorization, filtering requests, and blocking any potentially malicious requests from unauthorized clients.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-detection-and-response/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-detection-and-response.html"> <span class="article__title-text">Cloud Detection and Response (CDR)</span><span class="posts__title-link">Read More ></span> </a> <p>CDR is a security approach specifically designed for cloud environments that focuses on threat detection, immediate incident response, and service integrations.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-compliance/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-compliance.html"> <span class="article__title-text">Cloud Compliance</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud compliance refers to the process of adhering to regulatory standards, international laws and mandates, and industry best practices (frameworks, benchmarks) in the context of cloud computing.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-migration/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-migration.html"> <span class="article__title-text">Cloud Migration</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud migration refers to moving everything a business does — from data to applications — into a cloud computing environment. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-infrastructure/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-infrastructure.html"> <span class="article__title-text">Cloud Infrastructure</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud infrastructure is a collective term used to refer to the various components that enable cloud computing and the delivery of cloud services to the customer. This includes hardware, software, network devices, data storage and an abstraction layer that allows users to access virtualized resources. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/continuous-integration-continuous-delivery-ci-cd/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/continuous-integration-continuous-delivery-ci-cd.html"> <span class="article__title-text">Continuous Integration and Continuous Delivery (CI/CD) Pipeline</span><span class="posts__title-link">Read More ></span> </a> <p>CI/CD combines the practices of continuous integration (CI) and Continuous Delivery (CD) to allow DevOps teams to deliver code updates frequently, reliably, and quickly. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/common-vulnerability-scoring-system-cvss/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/common-vulnerability-scoring-system-cvss.html"> <span class="article__title-text">Common Vulnerability Scoring System (CVSS)</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-best-practices.html"> <span class="article__title-text">Cloud Security Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>In this blog, we’ll look at 20 recommended cloud security best practices organizations can implement throughout their cloud adoption process to keep their environments secure from cyberattacks.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/code-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/code-security.html"> <span class="article__title-text">Code Security</span><span class="posts__title-link">Read More ></span> </a> <p>Code security is the practice of writing and maintaining secure code. It means taking a proactive approach to dealing with potential vulnerabilities so more are addressed earlier in development and fewer reach live environments.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-native-application-protection-platform-cnapp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-native-application-protection-platform-cnapp.html"> <span class="article__title-text">Cloud-Native Application Protection Platform (CNAPP)</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud-native application protection platform (CNAPP) is an all-in-one cloud-native software platform that simplifies monitoring, detecting, and acting on potential cloud security threats and vulnerabilities.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-strategy/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-strategy.html"> <span class="article__title-text">Cloud Security Strategy</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud security strategy is a framework of tools, policies, and procedures for keeping your data, applications, and infrastructure in the cloud safe and protected from security risks.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-risks/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-risks.html"> <span class="article__title-text">Cloud Security Issues: Risks, Threats, and Challenges</span><span class="posts__title-link">Read More ></span> </a> <p>The reasons behind cloud breaches run the gamut, but can be broadly classified into four cloud security challenges: human errors, runtime threats, shadow IT and poor strategic planning.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/container-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/container-security.html"> <span class="article__title-text">Container Security</span><span class="posts__title-link">Read More ></span> </a> <p>Container Security is the continuous process of using security tools to protect containers from cyber threats and vulnerabilities throughout the CI/CD pipeline, deployment infrastructure, and the supply chain. </p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/advisory-services/cybersecurity-risk-assessment/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/advisory-services/cybersecurity-risk-assessment.html"> <span class="article__title-text">Cybersecurity Risk Assessment</span><span class="posts__title-link">Read More ></span> </a> <p>A cybersecurity risk assessment is a systematic process aimed at identifying vulnerabilities and threats within an organization's IT environment, assessing the likelihood of a security event, and determining the potential impact of such occurrences.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-infrastructure-entitlement-management-ciem/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-infrastructure-entitlement-management-ciem.html"> <span class="article__title-text">Cloud Infrastructure Entitlement Management (CIEM)</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud infrastructure entitlement management (CIEM) is a security process that helps security teams analyze and manage identities, access rights, privileges, and permissions in cloud environments.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/advisory-services/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/advisory-services.html"> <span class="article__title-text">Cybersecurity Advisory Services</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity advisory services encompass high-level guidance and strategic planning to ensure that an organization's cybersecurity measures are comprehensive, current, and effective.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/cyber-insurance/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/cyber-insurance.html"> <span class="article__title-text">Cyber Insurance Explained</span><span class="posts__title-link">Read More ></span> </a> <p>Cyber insurance, sometimes referred to as cyber liability insurance or cyber risk insurance, is a type of insurance that limits a policy holder’s liability and manages recovery costs in the event of a cyberattack, data breach or act of cyberterrorism.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/big-game-hunting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/big-game-hunting.html"> <span class="article__title-text">Cyber Big Game Hunting</span><span class="posts__title-link">Read More ></span> </a> <p>Cyber big game hunting is a type of cyberattack that usually leverages ransomware to target large, high-value organizations or high-profile entities.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-frameworks/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-frameworks.html"> <span class="article__title-text">Cloud Security Frameworks</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud security frameworks are sets of guidelines, best practices, and controls organizations use to approach the security of their data, applications, and infrastructure in cloud computing environments.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/container-lifecycle-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/container-lifecycle-management.html"> <span class="article__title-text">Container Lifecycle Management</span><span class="posts__title-link">Read More ></span> </a> <p>Container lifecycle management is a critical process of overseeing the creation, deployment, and operation of a container until its eventual decommissioning.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/center-for-internet-security-cis-benchmark/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/center-for-internet-security-cis-benchmark.html"> <span class="article__title-text">CIS Benchmarks</span><span class="posts__title-link">Read More ></span> </a> <p>A CIS Benchmark is a meticulously crafted, comprehensive set of security configuration guidelines for a specific technology. Developed by the Center for Internet Security (CIS), these Benchmarks are key to enhancing an organization's ability to prevent, detect, and respond to cyber threats.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/cybersecurity-transformation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity/cybersecurity-transformation.html"> <span class="article__title-text">Cybersecurity Transformation</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity transformation is the implementation of a comprehensive cybersecurity strategy that encompasses various components, including risk management, threat intelligence, security governance, incident response readiness, regulatory compliance, and more. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-workload-protection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-workload-protection.html"> <span class="article__title-text">Cloud Workload Protection (CWP)</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud Workload Protection platforms offer organizations a solution to continuously monitor for, and remove threats from their cloud workloads and containers.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-computing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-computing.html"> <span class="article__title-text">Cloud Computing</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud computing, commonly referred to as “the cloud", provides easy online access to a shared pool of configurable computing resources such as servers, storage, applications, and services.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-compromise-assessment/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-compromise-assessment.html"> <span class="article__title-text">Cloud Compromise Assessment</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud compromise assessment is an in-depth evaluation of an organization’s cloud infrastructure to identify, analyze, and mitigate potential security risks. Performing a regular assessment uncovers vulnerabilities and threats early. Assessments are crucial for maintaining a strong security posture. The main goal of the assessment is to uncover any signs of compromise before they can escalate into full-blown security incidents.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/credential-stuffing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/credential-stuffing.html"> <span class="article__title-text">Credential Stuffing</span><span class="posts__title-link">Read More ></span> </a> <p>Credential stuffing is a cyberattack where cybercriminals use stolen login credentials from one system to attempt to access an unrelated system.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/cybersquatting-domain-squatting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/cybersquatting-domain-squatting.html"> <span class="article__title-text">Cybersquatting</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersquatting is the abusive practice of registering and using an internet domain name that is identical or similar to trademarks, service marks, personal names or company names with the bad faith intent of hijacking traffic for financial profit, delivering malware payloads or stealing intellectual property.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/cloud-sprawl/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/cloud-sprawl.html"> <span class="article__title-text">Cloud Sprawl</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud sprawl is the uncontrolled proliferation of an organization's cloud services, instances, and resources. It is the unintended but often encountered byproduct of the rapid growth of an organization’s cloud services and resources.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/container-scanning/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/container-scanning.html"> <span class="article__title-text">Container Scanning</span><span class="posts__title-link">Read More ></span> </a> <p>Container scanning is the process of analyzing components within containers to uncover potential security threats. It is integral to ensuring that your software remains secure as it progresses through the application life cycle.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/crypto-malware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/crypto-malware.html"> <span class="article__title-text">Crypto-Malware</span><span class="posts__title-link">Read More ></span> </a> <p>Crypto-malware is a type of malicious software, or malware, designed to carry out long-term cryptojacking cyberattacks.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/platform-consolidation-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity/platform-consolidation-best-practices.html"> <span class="article__title-text">Cybersecurity Platform Consolidation Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity platform consolidation is the strategic integration of diverse security tools into a single, cohesive system, or, the concept of simplification through unification applied to your cybersecurity toolbox. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/cybersecurity-sandboxing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/cybersecurity-sandboxing.html"> <span class="article__title-text">Cybersecurity Sandboxing</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity sandboxing is the use of an isolated, safe space to study potentially harmful code. This practice is an essential tool for security-conscious enterprises and is instrumental in preventing the spread of malicious software across a network.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/computer-worm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/computer-worm.html"> <span class="article__title-text">Computer Worm</span><span class="posts__title-link">Read More ></span> </a> <p>A computer worm is a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/command-and-control-cac-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/command-and-control-cac-attack.html"> <span class="article__title-text">Command and Control (C&C) Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>C&C (also known as C2) is a method that cybercriminals use to communicate with compromised devices within a target company’s network.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/platform-consolidation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity/platform-consolidation.html"> <span class="article__title-text">Cybersecurity Platform Consolidation</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity platform consolidation is the strategic integration of diverse security tools into a single, cohesive system. </p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/incident-response/compromise-assessments/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/incident-response/compromise-assessments.html"> <span class="article__title-text">Compromise Assessments</span><span class="posts__title-link">Read More ></span> </a> <p>Compromise assessments are high-level investigations where skilled teams utilize advanced tools to dig more deeply into their environment to identify ongoing or past attacker activity in addition to identifying existing weaknesses in controls and practices. The intent of the comprehensive assessment is to answer the critical question: “Has my organization been breached?” </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-incident-response/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-incident-response.html"> <span class="article__title-text">Cloud Incident Response</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud Incident Response (Cloud IR) is the process you follow when a cybersecurity incident occurs in your cloud environment.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-architecture/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-architecture.html"> <span class="article__title-text">Cloud Security Architecture</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud security architecture is the umbrella term used to describe all hardware, software and infrastructure that protects the cloud environment and its components, such as data, workloads, containers, virtual machines and APIs.</p> </div> <div class="article" cs-item data-category="Application Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-application-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-application-security.html"> <span class="article__title-text">Cloud Application Security</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud application security is the process of securing cloud-based software applications throughout the development lifecycle.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-data-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-data-security.html"> <span class="article__title-text">Cloud Data Security</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud data security refers to the technologies, policies, services and security controls that protect any type of data in the cloud from loss, leakage or misuse through breaches, exfiltration and unauthorized access.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/cross-site-scripting-xss/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/cross-site-scripting-xss.html"> <span class="article__title-text">Cross Site Scripting (XSS)</span><span class="posts__title-link">Read More ></span> </a> <p>Cross Site Scripting (XSS) is a code injection attack in which an adversary inserts malicious code within a legitimate website.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/cyber-hygiene/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/cyber-hygiene.html"> <span class="article__title-text">Cyber Hygiene</span><span class="posts__title-link">Read More ></span> </a> <p>Cyber hygiene refers to the practices computer users adopt to maintain the safety and security of their systems in an online environment.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/container-as-a-service-caas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/container-as-a-service-caas.html"> <span class="article__title-text">Container-as-a-Service (CaaS)</span><span class="posts__title-link">Read More ></span> </a> <p>This guide will explore containerization's key role in modern application development and deployment. It will also discuss how containers as a service (CaaS) fits into the broader cloud service landscape, helping you stay ahead of the curve in this ever-evolving field.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/threat-hunting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/threat-hunting.html"> <span class="article__title-text">Cyber Threat Hunting</span><span class="posts__title-link">Read More ></span> </a> <p>Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/cyber-risk/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/cyber-risk.html"> <span class="article__title-text">Cyber Risk: Definition, Common Types and How To Protect Against Them</span><span class="posts__title-link">Read More ></span> </a> <p>Cyber risk measures the likelihood (probability) that an attacker may exploit a cyber threat, as well as considers the potential impact of that bad event, such as the loss of confidentiality, integrity and availability of an organization’s information.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-governance/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-governance.html"> <span class="article__title-text">Cloud Governance</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud governance is a set of policies and rules used by companies who build or work in the cloud. This framework is designed to ensure data security, system integration and the deployment of cloud computing are properly managed.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/image-container-exploitation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/image-container-exploitation.html"> <span class="article__title-text">Common Cloud Threats: Exploitation of Misconfigured Image Containers</span><span class="posts__title-link">Read More ></span> </a> <p>Developers sometimes use base images from an external registry to build their images. Unfortunately, these images can contain malware or vulnerable libraries.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/malware-hosting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/malware-hosting.html"> <span class="article__title-text">Common Cloud Threats: Malware Hosting</span><span class="posts__title-link">Read More ></span> </a> <p>Malware hosting occurs when cybercriminals use a free or compromised hosting account to host malware while using the hosting provider's reputation as cover.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-service-provider-abuse/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-service-provider-abuse.html"> <span class="article__title-text">Cloud Service Provider Abuse</span><span class="posts__title-link">Read More ></span> </a> <p>Adversaries leverage cloud service providers to abuse provider trust relationships and gain access to additional targets through lateral movement.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-vulnerability-exploitation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-vulnerability-exploitation.html"> <span class="article__title-text">Cloud Vulnerability Exploitation</span><span class="posts__title-link">Read More ></span> </a> <p>The fast adoption of the cloud has expanded the attack surface businesses must monitor and protect to avoid cloud vulnerability exploitation. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/credential-theft/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/credential-theft.html"> <span class="article__title-text">Credential Theft</span><span class="posts__title-link">Read More ></span> </a> <p>Credential theft is the act of stealing personal information such as usernames, passwords and financial information in order to gain access to an online account or system. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-file-formats/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-file-formats.html"> <span class="article__title-text">Common Log File Formats</span><span class="posts__title-link">Read More ></span> </a> <p>A log format defines how the contents of a log file should be interpreted. Typically, a format specifies the data structure and type of encoding. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/crud-vs-rest/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/crud-vs-rest.html"> <span class="article__title-text">CRUD vs REST Explained</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we will introduce CRUD and REST, explain their similarities and differences, and then consider how to best monitor their performance.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/crud/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/crud.html"> <span class="article__title-text">CRUD</span><span class="posts__title-link">Read More ></span> </a> <p>CRUD is the acronym for CREATE, READ, UPDATE and DELETE. These terms describe the four essential operations for creating and managing persistent data elements, mainly in relational and NoSQL databases.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/continuous-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/continuous-monitoring.html"> <span class="article__title-text">Continuous Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Continuous monitoring is an approach where an organization constantly monitors its IT systems and networks to detect security threats, performance issues, or non-compliance problems in an automated manner.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/container-security-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/container-security-best-practices.html"> <span class="article__title-text">Container Security Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>This article discusses the concept of container security and its main challenges, as well as best practices for developing secure containerized applications.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks.html"> <span class="article__title-text">Cyberattacks</span><span class="posts__title-link">Read More ></span> </a> <p>A cyberattack is an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.</p> </div> </div> <div id="d" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">D</span> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/dark-web-vs-deep-web/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/dark-web-vs-deep-web.html"> <span class="article__title-text">Deep Web vs Dark Web</span><span class="posts__title-link">Read More ></span> </a> <p>“Deep web” and “dark web” are NOT interchangeable terms. The deep web is any part of the Net that is not indexed by search engines. The dark web uses encryption software to provide even greater security.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-compliance/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-compliance.html"> <span class="article__title-text">Data Compliance</span><span class="posts__title-link">Read More ></span> </a> <p>Data compliance is the practice of ensuring that sensitive and protected data is organized and managed in a way that enables organizations and government entities to meet relevant legal and government regulations.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/deepfake-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/deepfake-attack.html"> <span class="article__title-text">Deepfake Attack</span><span class="posts__title-link">Read More ></span> </a> <p>Deepfakes are AI-generated forgeries — false images, audio, or video — that appear convincingly genuine.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/disinformation-campaign/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/disinformation-campaign.html"> <span class="article__title-text">Disinformation Campaign</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we'll explore the mechanics of disinformation campaigns, deliberate efforts to spread false information.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-theft-prevention/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-theft-prevention.html"> <span class="article__title-text">Data Theft Prevention</span><span class="posts__title-link">Read More ></span> </a> <p>Understand data theft — what it is, how it works, and the extent of its impact and look into the principles and best practices for data theft prevention. </p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/dark-ai/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/dark-ai.html"> <span class="article__title-text">Dark AI</span><span class="posts__title-link">Read More ></span> </a> <p>Dark AI refers to the application of AI technologies — and notably, recent innovations in generative AI (GenAI) — for the purposes of accelerating or enabling cyberattacks.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/dark-web-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/dark-web-monitoring.html"> <span class="article__title-text">Dark Web Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Dark web monitoring is the process of searching for, and tracking, your organization’s information on the dark web.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/data-flow-mapping/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/data-flow-mapping.html"> <span class="article__title-text">Data Flow Mapping</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/data-classification/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/data-classification.html"> <span class="article__title-text">Data Classification</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/data-onboarding/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/data-onboarding.html"> <span class="article__title-text">Data Onboarding</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/digital-forensics/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/digital-forensics.html"> <span class="article__title-text">Digital Forensics</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/devops-vs-devsecops/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/devops-vs-devsecops.html"> <span class="article__title-text">DevOps vs. DevSecOps</span><span class="posts__title-link">Read More ></span> </a> <p>DevOps and DevSecOps share cultural similarities but address different business goals. Knowing when to use each practice or transition from DevOps to DevSecOps can improve your business.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/devops/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/devops.html"> <span class="article__title-text">DevOps</span><span class="posts__title-link">Read More ></span> </a> <p>DevOps is a mindset and set of practices meant to effectively integrate development and operations into a cohesive whole in the modern product development life cycle. DevOps breaks down the divide between creating a product and maintaining it to allow for higher-paced service and application delivery.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-portability/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-portability.html"> <span class="article__title-text">Data Portability</span><span class="posts__title-link">Read More ></span> </a> <p>Data portability is the ability of users to easily transfer their personal data from one service provider to another. </p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/data-poisoning/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/data-poisoning.html"> <span class="article__title-text">Data Poisoning: The Exploitation of Generative AI</span><span class="posts__title-link">Read More ></span> </a> <p>Data poisoning is a type of cyberattack in which an adversary intentionally compromises a training dataset used by an AI or machine learning (ML) model to influence or manipulate the operation of that model.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-privacy/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-privacy.html"> <span class="article__title-text">Data Privacy</span><span class="posts__title-link">Read More ></span> </a> <p>Data privacy, also called information privacy, is an area of data protection that addresses the proper storage, access, retention, and security of sensitive data, which helps organizations meet regulatory requirements and protect the confidentiality and immutability of their data.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-loss-prevention-dlp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-loss-prevention-dlp.html"> <span class="article__title-text">Data Loss Prevention (DLP)</span><span class="posts__title-link">Read More ></span> </a> <p>Data loss prevention (DLP) is a set of tools and procedures that forms part of a company’s overall security strategy and focuses on detecting and preventing the loss, leakage, or misuse of data through breaches, exfiltration transmissions, and unauthorized use.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-protection-vs-data-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-protection-vs-data-security.html"> <span class="article__title-text">Data Protection vs Data Security</span><span class="posts__title-link">Read More ></span> </a> <p>Data protection and data security are often used interchangeably, but they have distinct focuses and objectives. Read this post to learn the difference.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/database-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/database-monitoring.html"> <span class="article__title-text">Database Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Database monitoring is the continuous tracking of a database’s activities and performance. It is crucial in helping optimize and tune database processes for high performance and reliability. Security is also another key factor to consider when it comes to monitoring databases due to the importance of this data.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-security.html"> <span class="article__title-text">Data Security</span><span class="posts__title-link">Read More ></span> </a> <p>Data security is the practice of protecting digital data from unauthorized access, use or disclosure in a manner consistent with an organization’s risk strategy. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/digital-forensics-and-incident-response-dfir/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/digital-forensics-and-incident-response-dfir.html"> <span class="article__title-text">Digital Forensics and Incident Response (DFIR)</span><span class="posts__title-link">Read More ></span> </a> <p>Digital Forensics and Incident Response (DFIR) is a field within cybersecurity that focuses on the identification, investigation, and remediation of cyberattacks.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/debug-logging/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/debug-logging.html"> <span class="article__title-text">Debug Logging</span><span class="posts__title-link">Read More ></span> </a> <p>Debug logging specifically focuses on providing information to assist in identifying and resolving bugs or defects. </p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-encryption/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-encryption.html"> <span class="article__title-text">Data Encryption</span><span class="posts__title-link">Read More ></span> </a> <p>Data encryption converts plain text into an encoded format to protect against unauthorized access to data.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/ddos-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/ddos-attack.html"> <span class="article__title-text">Distributed Denial-of-Service (DDoS) Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>DDoS, short for distributed-denial-of-service, is a cyberattack that attempts to interrupt a server or network by flooding it with fake internet traffic, preventing user access and disrupting operations.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/dos-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/dos-attack.html"> <span class="article__title-text">Denial-of-Service (DoS) Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>A Denial-of-Service (DoS) attack is a cyberattack that floods a machine or network with false requests in order to disrupt business operations.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-obfuscation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-obfuscation.html"> <span class="article__title-text">Data Obfuscation</span><span class="posts__title-link">Read More ></span> </a> <p>Data obfuscation is the process of disguising confidential or sensitive data to protect it from unauthorized access. Data obfuscation tactics can include masking, encryption, tokenization, and data reduction. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/data-breach/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/data-breach.html"> <span class="article__title-text">Data Breach</span><span class="posts__title-link">Read More ></span> </a> <p>A data breach is a security incident where an organization’s data is illegally stolen, copied, viewed, or released by an unauthorized individual or group.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/data-exfiltration/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/data-exfiltration.html"> <span class="article__title-text">Data Exfiltration</span><span class="posts__title-link">Read More ></span> </a> <p>Data exfiltration is the theft or unauthorized transfer of data from a device or network.</p> </div> </div> <div id="e" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">E</span> </div> <div class="article" cs-item data-category="Small Business"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/employee-cybersecurity-training-program/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/employee-cybersecurity-training-program.html"> <span class="article__title-text">Employee Cybersecurity Awareness Training Program</span><span class="posts__title-link">Read More ></span> </a> <p>CrowdStrike's how-to guide provides SMBs the steps & essentials (with examples) to develop the right training programs for your employees.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/entra-id/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/entra-id.html"> <span class="article__title-text">Entra ID: (formerly Azure Active Directory)</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we'll explore Entra ID, considering its advantages over traditional identity services. We’ll also look at how it integrates with CrowdStrike Falcon® Identity Protection to enhance your cybersecurity posture.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/extended-internet-of-things-xiot/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/extended-internet-of-things-xiot.html"> <span class="article__title-text">Extended Internet of Things (XIoT)</span><span class="posts__title-link">Read More ></span> </a> <p>The extended internet of things (XIoT) is an umbrella term that includes all internet of things (IoT) or physical devices connected to the internet. It encompasses IoT, operational technology (OT), internet of medical things (IoMT), industrial IoT (IIoT), and supervisory control and data acquisition (SCADA).</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/edr-vs-ngav/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/edr-vs-ngav.html"> <span class="article__title-text">EDR vs NGAV</span><span class="posts__title-link">Read More ></span> </a> <p>Discover more about two of the most critical elements to every cybersecurity architecture – endpoint detection and response (EDR) and next-generation antivirus (NGAV) – and the points organizations should consider when selecting and integrating these tools </p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/edr-vs-mdr-vs-xdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/edr-vs-mdr-vs-xdr.html"> <span class="article__title-text">EDR vs MDR vs XDR</span><span class="posts__title-link">Read More ></span> </a> <p>Learn the differences between endpoint detection and response (EDR), managed detection and response (MDR) and extended detection and response (XDR). </p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/epp-vs-edr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/epp-vs-edr.html"> <span class="article__title-text">EPP vs. EDR</span><span class="posts__title-link">Read More ></span> </a> <p>EPP and EDR are two critical and distinct components within a comprehensive cybersecurity strategy. </p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/endpoint-protection-platform-epp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/endpoint-protection-platform-epp.html"> <span class="article__title-text">Endpoint Protection Platforms (EPP)</span><span class="posts__title-link">Read More ></span> </a> <p>An endpoint protection platform (EPP) is a suite of endpoint security technologies such as antivirus, data encryption, and data loss prevention that work together on an endpoint device to detect and prevent security threats like file-based malware attacks and malicious activity.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/endpoint-protection-software/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/endpoint-protection-software.html"> <span class="article__title-text">Endpoint Protection Software</span><span class="posts__title-link">Read More ></span> </a> <p>Endpoint protection software offers a centralized management system from which security administrators can monitor, protect, and investigate vulnerabilities across all endpoints, including computers, mobile devices, servers and connected devices.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/endpoint-detection-and-response-edr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/endpoint-detection-and-response-edr.html"> <span class="article__title-text">Endpoint Detection and Response (EDR)</span><span class="posts__title-link">Read More ></span> </a> <p>Endpoint Detection and Response (EDR), also referred to as endpoint detection and threat response (EDTR), is an endpoint security solution that continuously monitors endpoint devices to detect and mitigate cyber threats.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/extended-detection-and-response-xdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/extended-detection-and-response-xdr.html"> <span class="article__title-text">Extended Detection and Response (XDR)</span><span class="posts__title-link">Read More ></span> </a> <p>XDR (extended detection and response) collects and correlates data from endpoints, cloud workloads, networks and email, analyzes and prioritizes them, and delivers them to security teams in a normalized format through a single console.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/endpoint/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/endpoint.html"> <span class="article__title-text">Endpoints</span><span class="posts__title-link">Read More ></span> </a> <p>An endpoint is any device that can be connected to a network. Common examples of endpoints include computers, laptops, mobile phones, tablets and servers.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security.html"> <span class="article__title-text">Endpoint Security</span><span class="posts__title-link">Read More ></span> </a> <p>Endpoint security, or endpoint protection, is the cybersecurity approach to defending endpoints – such as desktops, laptops, and mobile devices – from malicious activity.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/endpoint-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/endpoint-management.html"> <span class="article__title-text">Endpoint Management</span><span class="posts__title-link">Read More ></span> </a> <p>Endpoint management is an IT and cybersecurity process that consists of two main tasks: evaluating, assigning and overseeing the access rights of all endpoints; and applying security policies and tools that will reduce the risk of an attack or prevent such events.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/endpoint-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/endpoint-monitoring.html"> <span class="article__title-text">Endpoint Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Endpoint monitoring involves the continuous monitoring and management of devices that connect to a network, such as computers, mobile devices, and servers.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/exposure-management-vs-vulnerability-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/exposure-management-vs-vulnerability-management.html"> <span class="article__title-text">Exposure Management vs. Vulnerability Management</span><span class="posts__title-link">Read More ></span> </a> <p>Exposure management and vulnerability management both play pivotal roles in supporting an organization’s security posture. However, they serve different functions in cybersecurity.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/secops/exposure-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/secops/exposure-management.html"> <span class="article__title-text">Exposure Management in Cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>Exposure management is an organization’s process of identifying, assessing, and addressing security risks associated with exposed digital assets. Exposed assets include any endpoints, applications, or other cloud resources that can be used to breach an organization’s systems.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/external-attack-surface-management-easm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/external-attack-surface-management-easm.html"> <span class="article__title-text">External Attack Surface Management (EASM)</span><span class="posts__title-link">Read More ></span> </a> <p>External Attack Surface Management (EASM) refers to the continuous discovery, monitoring, evaluation, prioritization, and remediation of attack vectors of an organization's external attack surface. An External Attack Surface, also known as Digital Attack Surface, is the sum of an organization’s internet-facing assets and the associated attack vectors which can be exploited during an attack.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/ethical-hacker/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/ethical-hacker.html"> <span class="article__title-text">Ethical Hacker</span><span class="posts__title-link">Read More ></span> </a> <p>An ethical hacker, also known as a ‘white hat hacker’, is employed to legally break into computers and networks to test an organization’s overall security. Ethical hackers possess all the skills of a cyber criminal but use their knowledge to improve organizations rather than exploit and damage them.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/exploit-kit/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/exploit-kit.html"> <span class="article__title-text">Exploit Kits</span><span class="posts__title-link">Read More ></span> </a> <p>An exploit kit is a toolkit that cybercriminals use to attack specific vulnerabilities in a system or code. </p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/error-logs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/error-logs.html"> <span class="article__title-text">Error Logs</span><span class="posts__title-link">Read More ></span> </a> <p>An error log is a file that contains detailed records of error conditions a computer software encounters when it’s running.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/event-logs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/event-logs.html"> <span class="article__title-text">Event Log</span><span class="posts__title-link">Read More ></span> </a> <p>An event is any significant action or occurrence that's recognized by a software system and is then recorded in a special file called the event log. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/email-spoofing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/email-spoofing.html"> <span class="article__title-text">Email Spoofing: How to Identify a Spoofed Email</span><span class="posts__title-link">Read More ></span> </a> <p>Email spoofing is a type of cyberattack that targets businesses by using emails with forged sender addresses. Because the recipient trusts the alleged sender, they are more likely to open the email and interact with its contents, such as a malicious link or attachment.</p> </div> </div> <div id="f" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">F</span> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/fileless-malware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/fileless-malware.html"> <span class="article__title-text">Fileless Malware</span><span class="posts__title-link">Read More ></span> </a> <p>Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyberattack. Unlike traditional malware, which typically requires a file to be downloaded and installed, fileless malware operates in memory or manipulates native tools, making it harder to detect and remove. </p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/free-vs-paid-antivirus/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/free-vs-paid-antivirus.html"> <span class="article__title-text">Free Antivirus vs Paid Antivirus Software</span><span class="posts__title-link">Read More ></span> </a> <p>In this guide, we outline the key differences between free and paid antivirus solutions available to small businesses and help owners decide which option is right for their company.</p> </div> </div> <div id="g" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">G</span> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/google-cloud-migration/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/google-cloud-migration.html"> <span class="article__title-text">Guide To Google Cloud Migration</span><span class="posts__title-link">Read More ></span> </a> <p>Read this article to learn what a Google Cloud migration entails, its benefits, and the strategic approach needed for a successful transition.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/generative-ai/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/generative-ai.html"> <span class="article__title-text">Generative AI (GenAI) in Cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>Generative AI (GenAI) is a branch of artificial intelligence that focuses on generating new data based on existing data. This sophisticated technology enables a variety of use cases — such as data retrieval and analysis, content generation, and summarization — across a growing number of applications.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/how-to-protect-against-ransomware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/how-to-protect-against-ransomware.html"> <span class="article__title-text">Guide On How To Protect Against Ransomware</span><span class="posts__title-link">Read More ></span> </a> <p>Businesses of all sizes are vulnerable to cyberattacks like ransomware. To protect against this increasing risk, business owners can invest in endpoint protection solutions and educate themselves about how to prevent and mitigate the impact of ransomware.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/general-data-protection-regulation-gdpr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/general-data-protection-regulation-gdpr.html"> <span class="article__title-text">General Data Protection Regulation (GDPR)</span><span class="posts__title-link">Read More ></span> </a> <p>The General Data Protection Regulation (GDPR) is the European Union's (EU) personal data protection law that aims to protect the privacy of EU citizens. Enacted in May 2018, it imposes a unified set of rules on all organizations that process personal data originating from the EU, regardless of location.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-posture-management-cspm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-posture-management-cspm.html"> <span class="article__title-text">Guide to Cloud Security Posture Management (CSPM)</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud security posture management (CSPM) automates the identification and remediation of risks across cloud infrastructures.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/golden-ticket-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/golden-ticket-attack.html"> <span class="article__title-text">Golden Ticket Attack</span><span class="posts__title-link">Read More ></span> </a> <p>A Golden Ticket attack is a malicious cybersecurity attack in which a threat actor attempts to gain almost unlimited access to an organization’s domain.</p> </div> </div> <div id="h" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">H</span> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/honeypots/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/honeypots.html"> <span class="article__title-text">Honeypots</span><span class="posts__title-link">Read More ></span> </a> <p>A honeypot is a cybersecurity mechanism that leverages a manufactured attack target to lure cybercriminals away from legitimate targets and gather intelligence about the identity, methods and motivations of adversaries.</p> </div> <div class="article" cs-item data-category="Small Business"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/in-house-vs-outsourced-cybersecurity/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/in-house-vs-outsourced-cybersecurity.html"> <span class="article__title-text">How to choose between outsourced vs in-house cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>Learn the benefits and challenges of in-house and outsourced cybersecurity solutions to find the best fit for your business.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/honeytokens/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/honeytokens.html"> <span class="article__title-text">Honeytokens</span><span class="posts__title-link">Read More ></span> </a> <p>Honeytokens are digital resources that are purposely designed to be attractive to an attacker, but signify unauthorized use.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust-security/how-to-build-a-zero-trust-strategy/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust-security/how-to-build-a-zero-trust-strategy.html"> <span class="article__title-text">How to Build a Zero Trust Strategy</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we'll outline a framework for a true Zero Trust model that adheres to industry best practices while specifically avoiding the potential pitfalls. </p> </div> <div class="article" cs-item data-category="Small Business"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/how-to-hire-a-cybersecurity-expert/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/how-to-hire-a-cybersecurity-expert.html"> <span class="article__title-text">How to Hire a Cybersecurity Expert for Your Small Business</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity specialists play a key role in securing your organization’s information systems by monitoring, detecting, investigating and responding to security threats. So how should you go about bringing top cybersecurity talent to your company?</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/honey-account/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/honey-account.html"> <span class="article__title-text">Honey Account</span><span class="posts__title-link">Read More ></span> </a> <p>A honey account is a fabricated user account that triggers alerts for unauthorized activity when accessed. The honey account is part of your system, but it serves no real function other than incident detection. </p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust-security/how-to-implement-zero-trust/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust-security/how-to-implement-zero-trust.html"> <span class="article__title-text">How to Implement Zero Trust in Stages</span><span class="posts__title-link">Read More ></span> </a> <p>CrowdStrike offers the following recommendations to move Zero Trust along a journey of maturity based on your needs and priorities:</p> </div> <div class="article" cs-item data-category="Small Business"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/how-to-choose-a-cybersecurity-vendor/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/how-to-choose-a-cybersecurity-vendor.html"> <span class="article__title-text">How to Choose the Right Cybersecurity Vendor for Your Business</span><span class="posts__title-link">Read More ></span> </a> <p>Learn the eight factors to use when assessing a cybersecurity vendor to help you choose the right fit for your business now and in the future.</p> </div> <div class="article" cs-item data-category="Small Business"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/how-to-increase-your-cybersecurity-budget/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/how-to-increase-your-cybersecurity-budget.html"> <span class="article__title-text">How to increase your SMB cybersecurity budget</span><span class="posts__title-link">Read More ></span> </a> <p>Sharing helpful thought starters, considerations & tips to help IT leaders make the case for increasing their cybersecurity budget. Read more!</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/mitigating-insider-threats/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/mitigating-insider-threats.html"> <span class="article__title-text">How to Mitigate Insider Threats for Small Businesses</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we’ll take a closer look at insider threats – what they are, how to identify them, and the steps you can take to better protect your business from this serious threat.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/how-to-spot-a-phishing-email/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/how-to-spot-a-phishing-email.html"> <span class="article__title-text">How to Spot a Phishing Email</span><span class="posts__title-link">Read More ></span> </a> <p>The most common form of phishing attack is a phishing email. Discover the 7 telltale signs of a phishing email with examples here.</p> </div> <div class="article" cs-item data-category="Small Business"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/how-to-create-a-cybersecurity-budget/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/how-to-create-a-cybersecurity-budget.html"> <span class="article__title-text">How to Create a Cybersecurity Budget for Your Small Business</span><span class="posts__title-link">Read More ></span> </a> <p>Creating a budget for your evolving cybersecurity needs is critical. Learn tips to develop a budget that covers the protection your small business needs.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-security-policy/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-security-policy.html"> <span class="article__title-text">How To Design a Cloud Security Policy</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud security policy is a framework with rules and guidelines designed to safeguard your cloud-based systems and data. </p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-hashing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-hashing.html"> <span class="article__title-text">Hashing in Cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>In the context of cybersecurity, hashing is a way to keep sensitive information and data — including passwords, messages, and documents — secure.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/how-to-prevent-ransomware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/how-to-prevent-ransomware.html"> <span class="article__title-text">How To Prevent Ransomware: Pro Tips</span><span class="posts__title-link">Read More ></span> </a> <p>The following tips are supported by what CrowdStrike has found to successfully combat and prevent ransomware.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/how-ransomware-spreads/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/how-ransomware-spreads.html"> <span class="article__title-text">How Does Ransomware Spread</span><span class="posts__title-link">Read More ></span> </a> <p>As ransomware operators continue to evolve their tactics, it’s important to understand the 10 most common attack vectors used so that you can effectively defend your organization.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/hipaa-security-rule/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/hipaa-security-rule.html"> <span class="article__title-text">HIPAA Security Rule</span><span class="posts__title-link">Read More ></span> </a> <p>The HIPAA Security Rule specifies security standards for protecting individuals' electronic personal health information (ePHI) that is received, used, maintained, or transmitted by covered entities and their business associates.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/hybrid-cloud-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/hybrid-cloud-security.html"> <span class="article__title-text">Hybrid Cloud Security</span><span class="posts__title-link">Read More ></span> </a> <p>Hybrid cloud security is the protection of data and infrastructure that combines elements of private cloud, public cloud, and on-premises infrastructure into a unified architecture.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/human-intelligence-humint/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/human-intelligence-humint.html"> <span class="article__title-text">Human Intelligence (HUMINT) in Cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>Human Intelligence (HUMINT) is a form of “on the ground” information gathering using human sources to collect information.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/hybrid-cloud/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/hybrid-cloud.html"> <span class="article__title-text">Hybrid Cloud</span><span class="posts__title-link">Read More ></span> </a> <p>A hybrid cloud combines elements of a public cloud, private cloud and on-premises infrastructure into a single, common, unified architecture allowing data and applications to be shared between the mixed IT environment.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/phishing-attack-awareness-training/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/phishing-attack-awareness-training.html"> <span class="article__title-text">How To Implement Phishing Attack Awareness Training</span><span class="posts__title-link">Read More ></span> </a> <p>As cybercrime of all kinds, and phishing, in particular, reaches new heights in 2023, it’s important for every person in your organization to be able to identify a phishing attack and play an active role in keeping the business and your customers safe.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/hypervisors/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/hypervisors.html"> <span class="article__title-text">Hypervisor (VMM)</span><span class="posts__title-link">Read More ></span> </a> <p>A hypervisor, or virtual machine monitor (VMM), is virtualization software that creates and manages multiple virtual machines (VMs) from a single physical host machine. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/history-of-ransomware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/history-of-ransomware.html"> <span class="article__title-text">History of Ransomware</span><span class="posts__title-link">Read More ></span> </a> <p>Ransomware first cropped up around 2005 as just one subcategory of the overall class of scareware. Learn how it's evolved since then.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/hacktivism/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/hacktivism.html"> <span class="article__title-text">Hacktivism</span><span class="posts__title-link">Read More ></span> </a> <p>Hacktivism is a combination of the words “hack” and “activism”. Hacktivists engage in disruptive or damaging activity on behalf of a cause, be it political, social or religious in nature.</p> </div> </div> <div id="i" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">I</span> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/identity-access-management-iam/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/identity-access-management-iam.html"> <span class="article__title-text">Identity Access Management (IAM)</span><span class="posts__title-link">Read More ></span> </a> <p>Identity and access management (IAM) is a cybersecurity framework in which the IT team controls access to computer systems, cloud applications, networks, and assets based on each user or device’s digital identity. </p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/it-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity/it-security.html"> <span class="article__title-text">IT Security</span><span class="posts__title-link">Read More ></span> </a> <p>IT security is the overarching term used to describe the collective strategies, methods, solutions and tools used to protect the confidentiality, integrity and availability of the organization’s data and digital assets.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/indicators-of-attack-ioa/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/indicators-of-attack-ioa.html"> <span class="article__title-text">Indicators of Attack (IOAs)</span><span class="posts__title-link">Read More ></span> </a> <p>IOAs are telltale signs or activities that signal a potential cybersecurity threat or attack is in progress.</p> </div> <div class="article" cs-item data-category="Incident Response"> <a class="article__title" href="/en-us/cybersecurity-101/incident-response/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/incident-response.html"> <span class="article__title-text">Incident Response (IR)</span><span class="posts__title-link">Read More ></span> </a> <p>Incident response (IR) is the steps used to prepare for, detect, contain, and recover from a data breach.</p> </div> <div class="article" cs-item data-category="IT Automation"> <a class="article__title" href="/en-us/cybersecurity-101/it-automation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/it-automation.html"> <span class="article__title-text">IT Automation</span><span class="posts__title-link">Read More ></span> </a> <p>IT automation is the use of software to complete time-consuming, repetitive IT tasks without manual intervention.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/identity-security-posture-management-ispm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/identity-security-posture-management-ispm.html"> <span class="article__title-text">Identity Security Posture Management (ISPM)</span><span class="posts__title-link">Read More ></span> </a> <p>Identity security posture management (ISPM) is a framework used to strengthen and maintain the security posture of an organization’s identity infrastructure to prevent breaches.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/insider-threat-indicators/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/insider-threat-indicators.html"> <span class="article__title-text">Insider Threat Indicators</span><span class="posts__title-link">Read More ></span> </a> <p>An insider threat refers to the potential for a person to leverage a position of trust to harm the organization through misuse, theft or sabotage of critical assets.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/insider-threat/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/insider-threat.html"> <span class="article__title-text">Insider Threats</span><span class="posts__title-link">Read More ></span> </a> <p>An insider threat is a cybersecurity risk that comes from within the organization — usually by a current or former employee or other person who has direct access to the company network, sensitive data and intellectual property (IP).</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/identity-threat-detection-and-response-itdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/identity-threat-detection-and-response-itdr.html"> <span class="article__title-text">Identity Threat Detection and Response (ITDR)</span><span class="posts__title-link">Read More ></span> </a> <p>Identity threat detection and response (ITDR) is a security procedure for identifying, reducing, and responding to potential identity-based threats, such as compromised user accounts, leaked passwords, data breaches, and fraudulent activity.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection.html"> <span class="article__title-text">Identity Security</span><span class="posts__title-link">Read More ></span> </a> <p>Identity security, also known as identity protection, is a comprehensive solution that protects all types of identities within the enterprise</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/identity-segmentation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/identity-segmentation.html"> <span class="article__title-text">Identity Segmentation</span><span class="posts__title-link">Read More ></span> </a> <p>Identity segmentation is a method to restrict access to applications/resources based on identities. These identities could be human accounts, service (programmatic accounts), or privileged accounts.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/internet-of-things-iot-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/internet-of-things-iot-security.html"> <span class="article__title-text">Internet of Things (IoT) Security</span><span class="posts__title-link">Read More ></span> </a> <p>IoT security focuses on protecting, monitoring and remediating threats related to the Internet of Things (IoT) — the network of connected devices equipped to gather, store and share data via the internet. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/incident-responder/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/incident-responder.html"> <span class="article__title-text">Incident Responder</span><span class="posts__title-link">Read More ></span> </a> <p>An incident responder is a key player on an organization's cyber defense line. When a security breach is detected, incident responders step in immediately.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/iac-scanning/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/iac-scanning.html"> <span class="article__title-text">IaC Scanning: Definition, Processes, and Technologies</span><span class="posts__title-link">Read More ></span> </a> <p>IaC scanning is the process of codifying infrastructure setup and configuration to enable organizations to automate and streamline their deployments.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/injection-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/injection-attack.html"> <span class="article__title-text">Injection Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>Injection attacks occur when attackers exploit vulnerabilities in an application to send malicious code into a system.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/it-asset-discovery/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/it-asset-discovery.html"> <span class="article__title-text">IT Asset Discovery</span><span class="posts__title-link">Read More ></span> </a> <p>IT asset discovery is the process an organization uses to identify, catalog, and document all of its IT assets.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/it-asset-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/it-asset-management.html"> <span class="article__title-text">IT Asset Management (ITAM)</span><span class="posts__title-link">Read More ></span> </a> <p>IT asset management (ITAM) includes digital, cloud and hardware asset management and is a crucial discipline in cybersecurity. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/infrastructure-as-code-iac/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/infrastructure-as-code-iac.html"> <span class="article__title-text">Infrastructure as Code (IaC)</span><span class="posts__title-link">Read More ></span> </a> <p>Infrastructure as Code (IaC) is the process of dynamically managing and provisioning infrastructure through code instead of a manual process to simplify app development, configuration, and runtime. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/malware-spam-malspam/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/malware-spam-malspam.html"> <span class="article__title-text">Introduction to Malware Spam (Malspam)</span><span class="posts__title-link">Read More ></span> </a> <p>Malspam, short for malicious spam or spam containing malware, is a spam email that delivers malware as the malicious payload.</p> </div> <div class="article" cs-item data-category="Incident Response"> <a class="article__title" href="/en-us/cybersecurity-101/incident-response/incident-response-steps/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/incident-response/incident-response-steps.html"> <span class="article__title-text">Incident Response Plan</span><span class="posts__title-link">Read More ></span> </a> <p>Most IR plans can be summed up in 4 common steps: Preparation, Detection & Analysis, Containment & Eradication, and Post-Incident Activity.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/identity-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/identity-attack.html"> <span class="article__title-text">Identity-Based Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>To better understand the identity threat landscape, let's explore seven common identity-based attacks and how they work: </p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/iis-logs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/iis-logs.html"> <span class="article__title-text">IIS Logs</span><span class="posts__title-link">Read More ></span> </a> <p>IIS creates log files for each website it serves. You can set the log file location for an IIS-hosted website from the “Logging” section of the website.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/indicators-of-compromise-ioc/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/indicators-of-compromise-ioc.html"> <span class="article__title-text">Indicators of Compromise (IOC) Security</span><span class="posts__title-link">Read More ></span> </a> <p>An Indicator of Compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been breached.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/ioa-vs-ioc/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/ioa-vs-ioc.html"> <span class="article__title-text">IOA vs IOC</span><span class="posts__title-link">Read More ></span> </a> <p>Indicators of Attack vs Indicators of Compromise: Defining & Understanding the Differences </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/infrastructure-as-a-service-iaas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/infrastructure-as-a-service-iaas.html"> <span class="article__title-text">Infrastructure as a Service (IaaS)</span><span class="posts__title-link">Read More ></span> </a> <p>Infrastructure as a Service (IaaS) is a cloud computing model in which a third-party cloud service provider offers virtualized compute resources such as servers, data storage and network equipment on demand over the internet to clients.</p> </div> </div> <div id="j" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">J</span> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/just-in-time-access/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/just-in-time-access.html"> <span class="article__title-text">Just-in-Time (JIT) Access</span><span class="posts__title-link">Read More ></span> </a> <p>Just-in-time (JIT) access is a dynamic, on-demand approach to access control that grants human and non-human identities permissions to an application or system only when they need them to perform a specific, necessary task and only for the minimal amount of time necessary. </p> </div> </div> <div id="k" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">K</span> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/Kubernetes-Frameworks--NIST-vs-CIS/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/Kubernetes-Frameworks--NIST-vs-CIS.html"> <span class="article__title-text">Kubernetes Frameworks</span><span class="posts__title-link">Read More ></span> </a> <p>Kubernetes is a container orchestration system used to run various types of workloads, from user-facing web applications to backend processes. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/kubernetes-security-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/kubernetes-security-best-practices.html"> <span class="article__title-text">Kubernetes Security Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>These practices are based on the 4 Cs, which are designed to help organizations achieve optimal security across the primary layers of typical Kubernetes environments. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/kubernetes-as-a-service-kaas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/kubernetes-as-a-service-kaas.html"> <span class="article__title-text">Kubernetes as a Service (KaaS)</span><span class="posts__title-link">Read More ></span> </a> <p>KaaS is a managed solution offered by cloud providers to streamline the deployment, management, and operation of Kubernetes clusters.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/kubernetes-admission-controller/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/kubernetes-admission-controller.html"> <span class="article__title-text">Kubernetes with Admission Controllers</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we’ll take a deep dive into the world of Kubernetes admission controllers by discussing their importance, internal mechanisms, image scanning capabilities, and significance in the security posture of Kubernetes clusters.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/kubernetes-vs-docker/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/kubernetes-vs-docker.html"> <span class="article__title-text">Kubernetes vs Docker</span><span class="posts__title-link">Read More ></span> </a> <p>Docker is a versatile platform responsible for creating, managing, and sharing containers on a single host, while Kubernetes is a container orchestration tool responsible for the management, deployment, and monitoring of clusters of containers across multiple nodes.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/kerberoasting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/kerberoasting.html"> <span class="article__title-text">Kerberoasting Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>Kerberoasting is a post-exploitation attack technique that attempts to crack the password of a service account within the Active Directory (AD).</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/keylogger/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/keylogger.html"> <span class="article__title-text">Keyloggers: How They Work and How to Detect Them</span><span class="posts__title-link">Read More ></span> </a> <p>Keyloggers, or keystroke loggers, are tools that record what a person types on a device. While there are legitimate and legal uses for keyloggers, many uses for keyloggers are malicious.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/kubernetes-vs-mesos/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/kubernetes-vs-mesos.html"> <span class="article__title-text">Kubernetes vs. Mesos</span><span class="posts__title-link">Read More ></span> </a> <p>Container orchestration engines (COEs) make managing containerized workloads easier by automating operational tasks. Kubernetes and Apache Mesos are two of the most popular COEs. </p> </div> </div> <div id="l" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">L</span> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/lateral-movement/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/lateral-movement.html"> <span class="article__title-text">Lateral Movement</span><span class="posts__title-link">Read More ></span> </a> <p>Lateral movement refers to the techniques that a cyberattacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/low-code-application-platform/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity/low-code-application-platform.html"> <span class="article__title-text">Low-Code Application Platform</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we’ll examine the low-code application platform — and its near cousin, the low-code application platform — consider its benefits and limitations, and look specifically at the role it can play in cybersecurity.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-retention/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-retention.html"> <span class="article__title-text">Log Retention</span><span class="posts__title-link">Read More ></span> </a> <p>Log retention refers to how organizations store log files relating to security and for how long. It is a significant part of log management, and it’s integral to your cybersecurity.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-streaming/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-streaming.html"> <span class="article__title-text">Log Streaming</span><span class="posts__title-link">Read More ></span> </a> <p>Log streaming in cybersecurity refers to the real-time transfer and analysis of log data to enable immediate threat detection and response.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/logging-vs-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/logging-vs-monitoring.html"> <span class="article__title-text">Logging vs Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we’ll explore logging and monitoring processes, looking at why they’re important for managing applications. We’ll also cover best practices to integrate logging with monitoring to obtain robust visibility and accessibility over an entire application.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/logging-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/logging-best-practices.html"> <span class="article__title-text">Logging Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>This article considers some logging best practices that can lay the groundwork for a robust and scalable logging infrastructure. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/logging-levels/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/logging-levels.html"> <span class="article__title-text">Logging Levels Explained</span><span class="posts__title-link">Read More ></span> </a> <p>Setting up meaningful log levels is an important step in the log management process. Logging levels allow team members who are accessing and reading logs to understand the significance of the message they see in the log or observability tools being used. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-analysis/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-analysis.html"> <span class="article__title-text">Log Analysis</span><span class="posts__title-link">Read More ></span> </a> <p>Log analysis is the process of reviewing computer-generated event logs to proactively identify bugs, security threats, factors affecting system or application performance, or other risks.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-file/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-file.html"> <span class="article__title-text">Log Files Explained</span><span class="posts__title-link">Read More ></span> </a> <p>A log file is an event that took place at a certain time and might have metadata that contextualizes it. </p> </div> </div> <div id="m" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">M</span> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/man-in-the-middle-mitm-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/man-in-the-middle-mitm-attack.html"> <span class="article__title-text">Man in the Middle (MITM) Attack</span><span class="posts__title-link">Read More ></span> </a> <p>A man-in-the-middle attack is a type of cyberattack in which an attacker eavesdrops on a conversation between two targets.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/malware-vs-virus/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/malware-vs-virus.html"> <span class="article__title-text">Malware vs Virus</span><span class="posts__title-link">Read More ></span> </a> <p>The term malware describes any program or code created with the intent to do harm to a computer, network or server. A virus is a type of malware limited only to programs or code that self-replicates or copies itself in order to spread to other devices or areas of the network.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/managed-extended-detection-and-reponse-mxdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/managed-extended-detection-and-reponse-mxdr.html"> <span class="article__title-text">Managed XDR (MXDR)</span><span class="posts__title-link">Read More ></span> </a> <p>Managed XDR (MXDR) is an outsourced security service that provides advanced detection and response capabilities using a combination of digital technologies and human-led expertise.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/mobile-threat-defense-mtd/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/mobile-threat-defense-mtd.html"> <span class="article__title-text">Mobile Threat Defense (MTD)</span><span class="posts__title-link">Read More ></span> </a> <p>Mobile threat defense combines real-time threat detection, automated response and remediation, and comprehensive visibility and control. Learn more!</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/multifactor-authentication-mfa/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/multifactor-authentication-mfa.html"> <span class="article__title-text">Multi-factor Authentication (MFA)</span><span class="posts__title-link">Read More ></span> </a> <p>Multi-factor authentication (MFA) is a multi-layered security system that grants users access to a network, system or application only after confirming their identity with more than one credential or authentication factor. </p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/mdr-vs-soc/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/mdr-vs-soc.html"> <span class="article__title-text">MDR vs SOC</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity tools and services abound, but two standout services are managed detection and response (MDR) and security operations center (SOC) services.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/common-cyberattacks/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/common-cyberattacks.html"> <span class="article__title-text">Most Common Types of Cyberattacks</span><span class="posts__title-link">Read More ></span> </a> <p>Cyberattacks can target a wide range of victims from individual users to enterprises or even governments. When targeting businesses or other organizations, the hacker’s goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/machine-learning-and-ai-in-iam/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/machine-learning-and-ai-in-iam.html"> <span class="article__title-text">Machine Learning and AI in Identity Security</span><span class="posts__title-link">Read More ></span> </a> <p>In the domain of identity security, AI presents a promising pathway forward. By harnessing AI-driven identity security solutions, organizations can strengthen their defenses against identity-based attacks.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security.html"> <span class="article__title-text">Managed Security Services (MSS)</span><span class="posts__title-link">Read More ></span> </a> <p>Managed security services (MSS) is an umbrella term used to describe any cybersecurity service or solution offered by a third-party provider or managed security service provider (MSSP).</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/multi-cloud-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/multi-cloud-management.html"> <span class="article__title-text">Multi-Cloud Management</span><span class="posts__title-link">Read More ></span> </a> <p>Maintaining consistent security across platforms is crucial in a multi-cloud environment. Learn more about challenges and best practices!</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/multi-cloud-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/multi-cloud-security.html"> <span class="article__title-text">Multi-Cloud Security</span><span class="posts__title-link">Read More ></span> </a> <p>It is important to implement multi-cloud security to protect your infrastructure, application, and data across multiple clouds.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/multi-cloud-vulnerability-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/multi-cloud-vulnerability-management.html"> <span class="article__title-text">Multi-Cloud Vulnerability Management</span><span class="posts__title-link">Read More ></span> </a> <p>Multi-cloud vulnerability management is the continuous process of identifying and remediating security vulnerabilities across all your cloud environments, whether they’re public, private, or hybrid.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/managed-security-service-provider-mssp/managed-detection-and-response-mdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/managed-security-service-provider-mssp/managed-detection-and-response-mdr.html"> <span class="article__title-text">Managed Detection and Response (MDR)</span><span class="posts__title-link">Read More ></span> </a> <p>Managed detection and response (MDR) is a cybersecurity service that combines technology and human expertise to perform threat hunting, monitoring, and response.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/managed-detection-and-response-mdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/managed-detection-and-response-mdr.html"> <span class="article__title-text">Managed Detection and Response (MDR)</span><span class="posts__title-link">Read More ></span> </a> <p>Managed detection and response (MDR) is a cybersecurity service that combines technology and human expertise to perform threat hunting, monitoring, and response.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/machine-learning/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence/machine-learning.html"> <span class="article__title-text">Machine Learning (ML)</span><span class="posts__title-link">Read More ></span> </a> <p>This article provides an overview of foundational machine learning concepts and explains the growing application of machine learning in the cybersecurity industry, as well as key benefits, top use cases, common misconceptions and CrowdStrike’s approach to machine learning.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/managed-cloud-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/managed-cloud-security.html"> <span class="article__title-text">Managed Cloud Security</span><span class="posts__title-link">Read More ></span> </a> <p>Managed cloud security protects an organization’s digital assets through advanced cybersecurity measures, performing tasks like constant monitoring and threat detection.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/mdr-vs-mssp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/mdr-vs-mssp.html"> <span class="article__title-text">MDR vs MSSP: Defining both solutions and uncovering key differences</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we explore these two services, outline their key differentiators and help organizations decide which option is best for their business.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/mitre-attack-framework/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/mitre-attack-framework.html"> <span class="article__title-text">MITRE ATT&CK Framework</span><span class="posts__title-link">Read More ></span> </a> <p>The MITRE ATTACK Framework is a curated knowledge base that tracks cyber adversary tactics and techniques used by threat actors across the entire attack lifecycle.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/msp-vs-mssp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/msp-vs-mssp.html"> <span class="article__title-text">MSP vs. MSSP: Understanding the difference</span><span class="posts__title-link">Read More ></span> </a> <p>While both MSPs and MSSPs are third-party providers, the primary difference between the two is the scope of their offerings. Learn more here!</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/microservices-architecture/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/microservices-architecture.html"> <span class="article__title-text">Microservices Architecture</span><span class="posts__title-link">Read More ></span> </a> <p>A microservice-based architecture is a modern approach to software development that breaks down complex applications into smaller components that are independent of each other and more manageable.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/managed-security-service-provider-mssp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/managed-security-service-provider-mssp.html"> <span class="article__title-text">Managed Security Service Providers (MSSP) Explained</span><span class="posts__title-link">Read More ></span> </a> <p>A managed security service provider (MSSP) is an external party that provides cybersecurity services to its customers.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/malware-analysis/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/malware-analysis.html"> <span class="article__title-text">Malware Analysis</span><span class="posts__title-link">Read More ></span> </a> <p>Malware analysis is the process of understanding the behavior and purpose of a suspicious file or URL to help detect and mitigate potential threats.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/multi-cloud/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/multi-cloud.html"> <span class="article__title-text">Multi-Cloud</span><span class="posts__title-link">Read More ></span> </a> <p>Multi-cloud is when an organization leverages multiple public cloud services. These commonly consist of compute and storage solutions, but there are numerous options from various platforms to build your infrastructure.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware.html"> <span class="article__title-text">Malware</span><span class="posts__title-link">Read More ></span> </a> <p>Malware (malicious software) is an umbrella term used to describe a program or code created to harm a computer, network, or server. Cybercriminals develop malware to infiltrate a computer system discreetly to breach or destroy sensitive data and computer systems.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/malware-detection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/malware-detection.html"> <span class="article__title-text">Malware Detection Techniques</span><span class="posts__title-link">Read More ></span> </a> <p>Malware detection is a set of defensive techniques and technologies required to identify, block and prevent the harmful effects of malware. This protective practice consists of a wide body of tactics, amplified by various tools.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/mean-time-to-repair-mttr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/mean-time-to-repair-mttr.html"> <span class="article__title-text">Mean Time to Repair Explained</span><span class="posts__title-link">Read More ></span> </a> <p>Mean time to repair (MTTR) is a key performance indicator (KPI) that represents the average time required to restore a system to functionality after an incident.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/malicious-code/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/malicious-code.html"> <span class="article__title-text">Malicious Code: What It Is and How to Prevent It</span><span class="posts__title-link">Read More ></span> </a> <p>Malicious code is a term for code designed to cause damage, security breaches, or other threats to application security.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/malvertising/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/malvertising.html"> <span class="article__title-text">Malvertising</span><span class="posts__title-link">Read More ></span> </a> <p>Malvertising is a relatively new cyberattack technique that injects malicious code within digital ads. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/cyber-vulnerabilities/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/cyber-vulnerabilities.html"> <span class="article__title-text">Most Common Types of Cyber Vulnerabilities</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we review the 7 most common types of vulnerabilities, including: misconfigurations, unsecured APIs, zero days, unauthorized access, and unpatched software.</p> </div> </div> <div id="n" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">N</span> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem.html"> <span class="article__title-text">Next-Gen SIEM</span><span class="posts__title-link">Read More ></span> </a> <p>Next-gen SIEM is the evolution of traditional SIEM in response to digital advancements like cloud computing, big data, and remote work models to extend visibility beyond traditional perimeters.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/network-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity/network-security.html"> <span class="article__title-text">Network Security</span><span class="posts__title-link">Read More ></span> </a> <p>Network security refers to the tools, technologies and processes that protect an organization’s network and critical infrastructure from unauthorized use, cyberattacks, data loss and other security threats.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/non-human-identities/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/non-human-identities.html"> <span class="article__title-text">Non-Human Identities</span><span class="posts__title-link">Read More ></span> </a> <p>Non-human identities (NHIs) are digital identities for applications, services, or devices. Organizations use these identities to execute automatic machine-to-machine operations. Organizations grant NHIs specific permissions, but they often ignore the principle of least privilege (POLP). As a result, NHIs can create security vulnerabilities.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/network-segmentation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/network-segmentation.html"> <span class="article__title-text">Network Segmentation</span><span class="posts__title-link">Read More ></span> </a> <p>Network segmentation is a strategy used to segregate and isolate segments in the enterprise network to reduce the attack surface.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/next-generation-antivirus-ngav/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/next-generation-antivirus-ngav.html"> <span class="article__title-text">Next-Generation Antivirus (NGAV)</span><span class="posts__title-link">Read More ></span> </a> <p>Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioral detection, machine learning algorithms, and exploit mitigation, so known and unknown threats can be anticipated and immediately prevented.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/next-gen-siem-for-small-business/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/next-gen-siem-for-small-business.html"> <span class="article__title-text">Next Gen SIEM for Small Business</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/network-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/network-monitoring.html"> <span class="article__title-text">Network Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Network monitoring is an IT process that continuously monitors and evaluates a computer network and its assets.</p> </div> </div> <div id="o" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">O</span> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/open-source-intelligence-osint/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/open-source-intelligence-osint.html"> <span class="article__title-text">Open Source Intelligence (OSINT)</span><span class="posts__title-link">Read More ></span> </a> <p>Open source intelligence (OSINT) is the act of gathering and analyzing publicly available data for intelligence purposes.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/open-xdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/open-xdr.html"> <span class="article__title-text">Open XDR</span><span class="posts__title-link">Read More ></span> </a> <p>Open XDR is a type of extended detection and response (XDR) security solution or platform that supports third-party integrations to collect specific forms of telemetry to enable threat detection, hunting and investigation across the different data sources and execute response actions.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/open-xdr-vs-native-xdr/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/open-xdr-vs-native-xdr.html"> <span class="article__title-text">Open XDR vs. Native XDR</span><span class="posts__title-link">Read More ></span> </a> <p>Extended detection and response (XDR) is often broken into two main categories: open XDR and native XDR. Open XDR relies on third party integrations for full coverage of telemetry, while native XDR handles all collection and response tasks from a single vendor platform. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/observability/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability.html"> <span class="article__title-text">Observability</span><span class="posts__title-link">Read More ></span> </a> <p>Observability is when you infer the internal state of a system only by observing its external outputs. For modern IT infrastructure, a highly observable system exposes enough information for the operators to have a holistic picture of its health.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/observability-vs-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/observability-vs-monitoring.html"> <span class="article__title-text">Observability vs. Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Monitoring tells you that something is wrong. Observability uses data collection to tell you what is wrong and why it happened.</p> </div> </div> <div id="p" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">P</span> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/pass-the-hash-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/pass-the-hash-attack.html"> <span class="article__title-text">Pass-the-Hash Attack</span><span class="posts__title-link">Read More ></span> </a> <p>Pass the hash is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it to create a new user session on the same network.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/passwordless-authentication/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/passwordless-authentication.html"> <span class="article__title-text">Passwordless Authentication</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/password-storage/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/password-storage.html"> <span class="article__title-text">Password Storage</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity experts strongly recommend using a password manager to safely store account information on all connected devices, including desktops, laptops, tablets and smartphones.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/principle-of-least-privilege-polp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/principle-of-least-privilege-polp.html"> <span class="article__title-text">Principle of Least Privilege (POLP)</span><span class="posts__title-link">Read More ></span> </a> <p>The principle of least privilege (POLP) is a computer security concept and practice that gives users limited access rights based on the tasks necessary to their job.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/phishing-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/phishing-attack.html"> <span class="article__title-text">Phishing</span><span class="posts__title-link">Read More ></span> </a> <p>Phishing is a type of cyberattack where threat actors masquerade as legitimate companies or individuals to steal sensitive information such as usernames, passwords, credit card numbers, and other personal details. </p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/privileged-access-management-pam/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/privileged-access-management-pam.html"> <span class="article__title-text">Privileged Access Management (PAM)</span><span class="posts__title-link">Read More ></span> </a> <p>Privileged access management helps organizations manage and secure access to their most critical systems, applications, and data, which are typically reserved for privileged accounts.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/patch-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/patch-management.html"> <span class="article__title-text">Patch Management</span><span class="posts__title-link">Read More ></span> </a> <p>Patch management is the process of identifying and deploying software updates, or “patches,” to a variety of endpoints, including computers, mobile devices, and servers.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/policy-as-code/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/policy-as-code.html"> <span class="article__title-text">Policy As Code (PaC)</span><span class="posts__title-link">Read More ></span> </a> <p>Policy as Code is the representation of policies and regulations as code to improve and automate policy enforcement and management. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/public-cloud/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/public-cloud.html"> <span class="article__title-text">Public Cloud</span><span class="posts__title-link">Read More ></span> </a> <p>A public cloud is a third-party IT management solution that hosts on-demand cloud computing services and physical infrastructure using the public internet.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/pci-dss-requirements/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/pci-dss-requirements.html"> <span class="article__title-text">PCI DSS Compliance</span><span class="posts__title-link">Read More ></span> </a> <p>The Payment Card Industry Data Security Standard (PCI DSS) is a framework developed by the Payment Card Industry Security Standards Council (PCI SSC) to help secure and protect all payment card account data.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/advisory-services/penetration-testing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/advisory-services/penetration-testing.html"> <span class="article__title-text">Penetration Testing (Pen Testing)</span><span class="posts__title-link">Read More ></span> </a> <p>Penetration testing, or pen testing, is the simulation of real-world attacks in order to test an organization’s detection and response capabilities. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/public-cloud-vs-private-cloud/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/public-cloud-vs-private-cloud.html"> <span class="article__title-text">Public Cloud vs Private Cloud</span><span class="posts__title-link">Read More ></span> </a> <p>The key difference between public and private cloud computing relates to access. In a public cloud, organizations use shared cloud infrastructure, while in a private cloud, organizations use their own infrastructure.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/advisory-services/purple-teaming/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/advisory-services/purple-teaming.html"> <span class="article__title-text">Purple Teaming Explained</span><span class="posts__title-link">Read More ></span> </a> <p>A purple team is a group of cyber security professionals who simulate malicious attacks and penetration testing in order to identify security vulnerabilities and recommend remediation strategies for an organization’s IT infrastructure.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/postgresql-vs-mysql/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/postgresql-vs-mysql.html"> <span class="article__title-text">PostgreSQL vs. MySQL</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we will learn about the main features of PostgreSQL and MySQL, compare the two database management systems, and learn when to use PostgreSQL vs MySQL. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/platform-as-a-service-paas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/platform-as-a-service-paas.html"> <span class="article__title-text">Platform as a Service (PaaS)</span><span class="posts__title-link">Read More ></span> </a> <p>Platform as a Service (PaaS) is a cloud computing model in which a third-party cloud provider maintains an environment for customers on a pay-as-you-go basis to build, develop, run and manage their own applications.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/password-spraying/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/password-spraying.html"> <span class="article__title-text">Password Spraying</span><span class="posts__title-link">Read More ></span> </a> <p>A Password spraying attack involve an attacker using a single common password against multiple accounts on the same application.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/privilege-escalation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/privilege-escalation.html"> <span class="article__title-text">Privilege Escalation</span><span class="posts__title-link">Read More ></span> </a> <p>A privilege escalation attack is a cyberattack designed to gain unauthorized privileged access into a system.</p> </div> </div> <div id="q" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">Q</span> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust-security/questions-to-ask-zero-trust-vendors/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust-security/questions-to-ask-zero-trust-vendors.html"> <span class="article__title-text">Questions to Ask Zero Trust Vendors</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> </div> <div id="r" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">R</span> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware.html"> <span class="article__title-text">Ransomware</span><span class="posts__title-link">Read More ></span> </a> <p>Ransomware is a type of malware that encrypts a victim’s data until a payment is made to the attacker. If the payment is made, the victim receives a decryption key to restore access to their files. If the ransom payment is not made, the malicious actor publishes the data on data leak sites (DLS) or blocks access to the files in perpetuity.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/remote-desk-protocol-rdp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/remote-desk-protocol-rdp.html"> <span class="article__title-text">Remote Desk Protocol (RDP)</span><span class="posts__title-link">Read More ></span> </a> <p>RDP is software that allows users to control a remote desktop as if it were local.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/role-based-access-control/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/role-based-access-control.html"> <span class="article__title-text">Role-Based Access Control (RBAC)</span><span class="posts__title-link">Read More ></span> </a> <p>Role-based access control is a mechanism where you allow users to access certain resources based on permissions defined for the roles they are assigned to. </p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/remote-monitoring-management-rmm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/remote-monitoring-management-rmm.html"> <span class="article__title-text">Remote Monitoring and Management (RMM)</span><span class="posts__title-link">Read More ></span> </a> <p>Remote monitoring and management (RMM) is used by IT departments in many organizations to help oversee and administer IT systems from a remote location.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/regulatory-compliance/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/regulatory-compliance.html"> <span class="article__title-text">Regulatory Compliance</span><span class="posts__title-link">Read More ></span> </a> <p>In this article, we’ll discuss regulatory compliance, exploring the challenges that organizations commonly encounter.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/ransomware-examples/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/ransomware-examples.html"> <span class="article__title-text">Ransomware Examples: Recent Ransomware Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we explore 16 recent ransomware examples to outline the adversaries behind them and how they work.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/rootkits/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/rootkits.html"> <span class="article__title-text">Rootkit Malware</span><span class="posts__title-link">Read More ></span> </a> <p>Rootkit malware is a collection of software designed to give malicious actors control of a computer, network or application.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/risk-based-vulnerability-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/risk-based-vulnerability-management.html"> <span class="article__title-text">Risk Based Vulnerability Management</span><span class="posts__title-link">Read More ></span> </a> <p>Risk-based vulnerability management is a cybersecurity process that aims to identify and remediate vulnerabilities that pose the greatest risk to an organization.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/advisory-services/red-teaming/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/advisory-services/red-teaming.html"> <span class="article__title-text">Red Teaming: How Red Team Testing Prepares You for Cyberattacks</span><span class="posts__title-link">Read More ></span> </a> <p>Red team testing uses ethical hacking by simulating real-world techniques so your team can identify vulnerabilities in your system and practice response methods. Red teaming goes beyond a penetration test, or pen test, because it puts a team of adversaries — the red team — against an organization’s security team — the blue team.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/runtime-application-self-protection-rasp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/runtime-application-self-protection-rasp.html"> <span class="article__title-text">Runtime Application Self-Protection (RASP)</span><span class="posts__title-link">Read More ></span> </a> <p>Runtime Application Self-Protection (RASP) is a term coined by Gartner to describe a technology that incorporates security functionality within software applications to prevent malicious attacks while the application is running.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/advisory-services/red-team-vs-blue-team/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/advisory-services/red-team-vs-blue-team.html"> <span class="article__title-text">Red Team vs Blue Team</span><span class="posts__title-link">Read More ></span> </a> <p>In a red team/blue team exercise, the red team is made up of offensive security experts who try to attack an organization's cybersecurity defenses. The blue team defends against and responds to the red team attack.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/ransomware-as-a-service-raas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/ransomware-as-a-service-raas.html"> <span class="article__title-text">Ransomware as a Service (RaaS) Explained How It Works & Examples</span><span class="posts__title-link">Read More ></span> </a> <p>Ransomware as a Service (RaaS) is a business model used by ransomware developers, in which they lease ransomware variants in the same way that legitimate software developers lease SaaS products.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/ransomware-detection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/ransomware-detection.html"> <span class="article__title-text">Ransomware Detection</span><span class="posts__title-link">Read More ></span> </a> <p>Ransomware detection is the first defense against dangerous malware since it finds the infection earlier so that victims can take action to prevent irreversible damage.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/ransomware-recovery/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/ransomware-recovery.html"> <span class="article__title-text">Ransomware Recovery: Steps to Recover your Data</span><span class="posts__title-link">Read More ></span> </a> <p>A ransomware recovery plan is a playbook to address a ransomware attack, which includes an incident response team, communication plan, and step-by-step instructions to recover your data and address the threat.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/remote-code-execution/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/remote-code-execution.html"> <span class="article__title-text">Remote Code Execution (RCE): Principles and Function</span><span class="posts__title-link">Read More ></span> </a> <p>Remote code execution (RCE) refers to a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network.</p> </div> </div> <div id="s" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">S</span> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/scareware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/scareware.html"> <span class="article__title-text">Scareware</span><span class="posts__title-link">Read More ></span> </a> <p>Scareware is a type of malware attack that claims to have detected a virus or other issue on a device and directs the user to download or buy malicious software to resolve the problem. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/serverless-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/serverless-security.html"> <span class="article__title-text">Serverless Security</span><span class="posts__title-link">Read More ></span> </a> <p>In serverless architectures, security responsibilities are divided between the cloud provider and the customer, according to what is known as the shared responsibility model.</p> </div> <div class="article" cs-item data-category="Small Business"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/cybersecurity-checklist/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/cybersecurity-checklist.html"> <span class="article__title-text">Small Business Cybersecurity Checklist</span><span class="posts__title-link">Read More ></span> </a> <p>Our cybersecurity checklist will help SMBs uncover any risk areas & identify opportunities for improving the security of your operations.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/shift-left-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/shift-left-security.html"> <span class="article__title-text">Shift Left</span><span class="posts__title-link">Read More ></span> </a> <p>Shifting left in the context of DevSecOps means implementing testing and security into the earliest phases of the application development process. This process is known as “shift left” because it moves the security or testing component to the left (earlier) in the software development life cycle. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/semi-structured-data/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/semi-structured-data.html"> <span class="article__title-text">Semi-Structured Data</span><span class="posts__title-link">Read More ></span> </a> <p></p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/shift-left-vs-shield-right-kubernetes/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/shift-left-vs-shield-right-kubernetes.html"> <span class="article__title-text">Shift Left vs. Shield Right in Kubernetes</span><span class="posts__title-link">Read More ></span> </a> <p>Learn how security teams can combine shift left and shield right concepts throughout the software development lifecycle to achieve stronger Kubernetes security posture.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/cybersecurity/software-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cybersecurity/software-security.html"> <span class="article__title-text">Software Security</span><span class="posts__title-link">Read More ></span> </a> <p>Software security refers to a set of practices that developers incorporate into the software development life cycle and testing processes to ensure their digital solutions remain secure and are able to function in the event of a malicious attack.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/security-as-a-service-secaas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/security-as-a-service-secaas.html"> <span class="article__title-text">Security as a Service (SECaaS)</span><span class="posts__title-link">Read More ></span> </a> <p>Security as a service (SECaaS) is a comprehensive solution that helps an organization address any security issue without needing its own dedicated security staff.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/software-as-a-service-saas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/software-as-a-service-saas.html"> <span class="article__title-text">Software as a Service (SaaS)</span><span class="posts__title-link">Read More ></span> </a> <p>Software as a Service (SaaS) is a cloud-based software delivery model that allows users to access applications through an internet-connected device rather than requiring an upfront purchase and installation of physical software.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/soc-as-a-service-socaas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/soc-as-a-service-socaas.html"> <span class="article__title-text">SOC-as-a-Service</span><span class="posts__title-link">Read More ></span> </a> <p>SOC-as-a-Service (SOCaaS) is a security model wherein a third-party vendor operates and maintains a fully-managed SOC on a subscription basis via the cloud.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/shadow-it/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/shadow-it.html"> <span class="article__title-text">Shadow IT</span><span class="posts__title-link">Read More ></span> </a> <p>Shadow IT is the unauthorized use of any digital service or device that is not formally approved of and supported by the IT department.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/security-operations-center-soc/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/security-operations-center-soc.html"> <span class="article__title-text">Security Operations Center (SOC)</span><span class="posts__title-link">Read More ></span> </a> <p>A security operations center, or SOC, is a central location where security experts monitor, detect, analyze, respond to, and report security incidents. </p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/soc-best-practices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/soc-best-practices.html"> <span class="article__title-text">SOC Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>Building a first-class security operations center is no simple feat – maintaining it is even harder. We discuss four security operations center best practices that every organization should strive for. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/data-lake/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/data-lake.html"> <span class="article__title-text">Security Data Lake</span><span class="posts__title-link">Read More ></span> </a> <p>This innovation represents a pivotal development in cybersecurity, offering a centralized repository capable of efficiently storing, managing, and analyzing diverse security data, thereby addressing the critical challenges posed by the data deluge.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/soc-automation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/soc-automation.html"> <span class="article__title-text">SOC Automation</span><span class="posts__title-link">Read More ></span> </a> <p>Automation significantly boosts the efficiency of SOCs by streamlining processes and handling repetitive, manual tasks. Automation not only accelerates threat detection and mitigation but allows SOC teams to focus on more strategic tasks.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/security-orchestration-automation-and-response-soar/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/security-orchestration-automation-and-response-soar.html"> <span class="article__title-text">Security Orchestration, Automation and Response (SOAR)</span><span class="posts__title-link">Read More ></span> </a> <p>Security orchestration, automation and response (SOAR) is a collection of software programs developed to bolster an organization’s cybersecurity posture. A SOAR platform enables a security analyst team to monitor security data from a variety of sources, including security information and management systems and threat intelligence platforms.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/software-composition-analysis/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/software-composition-analysis.html"> <span class="article__title-text">Software Composition Analysis (SCA)</span><span class="posts__title-link">Read More ></span> </a> <p>Software composition analysis (SCA) is a technique used for examining the software components that make up an application and then identifying and managing any vulnerabilities discovered.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/security-as-code/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/security-as-code.html"> <span class="article__title-text">Security as Code (SaC)</span><span class="posts__title-link">Read More ></span> </a> <p>Security as code (SaC) is the integration of automated security measures directly into the software development process, making it an integral part of the software development life cycle (SDLC). SaC introduces proactive rather than reactive security measures, an essential approach given the increasing sophistication of modern cyber threats.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/spear-phishing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/spear-phishing.html"> <span class="article__title-text">Spear-Phishing</span><span class="posts__title-link">Read More ></span> </a> <p>Spear-phishing is a targeted attack that uses fraudulent emails, texts and phone calls in order to steal a specific person's sensitive information.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/security-posture/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/security-posture.html"> <span class="article__title-text">Security Posture</span><span class="posts__title-link">Read More ></span> </a> <p>An organization’s security posture is a holistic snapshot of their security strengths and vulnerabilities across hardware, software, data, and user behavior.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/software-development-lifecycle-sdlc/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/software-development-lifecycle-sdlc.html"> <span class="article__title-text">Software Development Lifecycle (SDLC)</span><span class="posts__title-link">Read More ></span> </a> <p>The software development life cycle (SDLC) outlines the stages involved in building software applications, from inception to retirement.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/serverless-architecture/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/serverless-architecture.html"> <span class="article__title-text">Serverless Architecture Explained</span><span class="posts__title-link">Read More ></span> </a> <p>Serverless architecture is a software development approach in which developers can run applications without managing the underlying infrastructure. In the serverless computing model, the cloud provider handles all infrastructure setup, maintenance, and scaling.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/software-bill-of-materials-sbom/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/software-bill-of-materials-sbom.html"> <span class="article__title-text">SBOM (Software Bill of Materials)</span><span class="posts__title-link">Read More ></span> </a> <p>In this post, we will cover the key parts of an SBOM, the benefits and challenges for an organization adopting SBOMs, and how an organization might integrate the usage of SBOMs within its current suite of security tools. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering.html"> <span class="article__title-text">Social Engineering</span><span class="posts__title-link">Read More ></span> </a> <p>Social engineering is an umbrella term that describes a variety of cyberattacks that use psychological tactics to manipulate people into taking a desired action, like giving up confidential information. </p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/snort-rules/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/snort-rules.html"> <span class="article__title-text">Snort and Snort Rules Explained</span><span class="posts__title-link">Read More ></span> </a> <p>Snort is an open-source network intrusion detection and prevention system (IDS/IPS) that monitors network traffic and identifies potentially malicious activities on Internet Protocol (IP) networks.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/secops/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/secops.html"> <span class="article__title-text">SecOps</span><span class="posts__title-link">Read More ></span> </a> <p>SecOps is an approach that combines the processes, tools, and highly skilled staff from both security and IT departments into a single, unified team.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/security-automation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/security-automation.html"> <span class="article__title-text">Security Automation</span><span class="posts__title-link">Read More ></span> </a> <p>Security automation is the practice of using technology to perform recurring IT security tasks, such as endpoint scanning and incident response, with limited human intervention.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/siem-vs-log-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/siem-vs-log-management.html"> <span class="article__title-text">SIEM vs Log Management</span><span class="posts__title-link">Read More ></span> </a> <p>Understand the difference in capabilities, definitions, and costs between a SIEM and a log management solutions (LMS). </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/smishing-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/smishing-attack.html"> <span class="article__title-text">Smishing</span><span class="posts__title-link">Read More ></span> </a> <p>Smishing is the act of sending fraudulent text messages designed to trick individuals into sharing sensitive data such as passwords, usernames and credit card numbers.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/silver-ticket-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/silver-ticket-attack.html"> <span class="article__title-text">Silver Ticket Attack</span><span class="posts__title-link">Read More ></span> </a> <p>Similar to a golden ticket attack, a silver ticket attack compromises credentials by taking advantage of the Kerberos protocol. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/structured-logging/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/structured-logging.html"> <span class="article__title-text">Structured, Unstructured and Semi Structured Logging Explained</span><span class="posts__title-link">Read More ></span> </a> <p>Structured, semi structured and unstructured logging falls on a large spectrum each with its own set of benefits and challenges. Unstructured and semi structured logs are easy to read by humans but can be tough for machines to extract while structured logs are easy to parse in your log management system but difficult to use without a log management tool. </p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/server-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/server-monitoring.html"> <span class="article__title-text">Server Monitoring</span><span class="posts__title-link">Read More ></span> </a> <p>Server monitoring provides visibility into network connectivity, available capacity and performance, system health, and much more. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/security-misconfiguration/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/security-misconfiguration.html"> <span class="article__title-text">Security Misconfiguration</span><span class="posts__title-link">Read More ></span> </a> <p>Security misconfiguration is any error or vulnerability present in the configuration of code that allows attackers access to sensitive data. There are many types of security misconfiguration, but most present the same danger: vulnerability to data breach and attackers gaining unauthorized access to data.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/security-testing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/security-testing.html"> <span class="article__title-text">Security Testing</span><span class="posts__title-link">Read More ></span> </a> <p>Security testing is a type of software testing that identifies potential security risks and vulnerabilities in applications, systems and networks. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/shared-responsibility/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/shared-responsibility.html"> <span class="article__title-text">Shared Responsibility Model</span><span class="posts__title-link">Read More ></span> </a> <p>The Shared Responsibility Model dictates that a cloud provider must monitor and respond to security threats related to the cloud itself and its underlying infrastructure and end users are responsible for protecting data and other assets they store in any cloud environment. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/sql-injection-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/sql-injection-attack.html"> <span class="article__title-text">SQL Injection (SQLi): How to Protect against SQL Injection Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>SQL injection (SQLi) is a cyberattack that injects malicious SQL code into an application, allowing the attacker to view or modify a database. Injection attacks, which include SQL injections, were the third most serious web application security risk in 2021.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/soa-vs-microservices/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/soa-vs-microservices.html"> <span class="article__title-text">SOA vs Microservices</span><span class="posts__title-link">Read More ></span> </a> <p>As development teams require more flexibility, scalability and speed, traditional monolithic software development models have become largely obsolete. To meet the needs of the modern landscape, two options have emerged for effectively and efficiently building and running large-scale, complex applications: service oriented architecture (SOA) and microservices.</p> </div> </div> <div id="t" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">T</span> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/threat-detection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/threat-detection.html"> <span class="article__title-text">Threat Detection and Response (TDR)</span><span class="posts__title-link">Read More ></span> </a> <p>Threat detection and response (TDR) refers to cybersecurity tools that identify threats by analyzing user behaviors.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/types-of-ransomware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/types-of-ransomware.html"> <span class="article__title-text">Types of Ransomware</span><span class="posts__title-link">Read More ></span> </a> <p>The most common types of ransomware are cryptoware, locker ransomware, scareware, leakware, and ransomware-as-a-service.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/dark-web/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/dark-web.html"> <span class="article__title-text">The Dark Web</span><span class="posts__title-link">Read More ></span> </a> <p>The dark web is the part of the internet where users can access unindexed web content anonymously through special web browsers like TOR.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/threat-intelligence-platforms/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/threat-intelligence-platforms.html"> <span class="article__title-text">Threat Intelligence Platforms</span><span class="posts__title-link">Read More ></span> </a> <p>A Threat Intelligence Platform automates the collection, aggregation, and reconciliation of external threat data, providing security teams with most recent threat insights to reduce threat risks relevant for their organization. </p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/threat-detection-investigation-response-tdir/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/threat-detection-investigation-response-tdir.html"> <span class="article__title-text">Threat Detection, Investigation, and Response (TDIR)</span><span class="posts__title-link">Read More ></span> </a> <p>Threat detection, investigation, and response (TDIR) is a cybersecurity process for finding, analyzing, and mitigating threats.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/small-business/how-to-scale-your-cybersecurity-program/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/small-business/how-to-scale-your-cybersecurity-program.html"> <span class="article__title-text">Tips and Tools to Scale Your Cybersecurity Program</span><span class="posts__title-link">Read More ></span> </a> <p>Get the 9 essential tips and tools that’ll help your organization scale its cybersecurity program.</p> </div> <div class="article" cs-item data-category="Advisory Services"> <a class="article__title" href="/en-us/cybersecurity-101/advisory-services/tabletop-exercise/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/advisory-services/tabletop-exercise.html"> <span class="article__title-text">Tabletop Exercise</span><span class="posts__title-link">Read More ></span> </a> <p>Tabletop exercises are a form of cyber defense training in which teams walk through simulated cyberattack scenarios in a structured, discussion-based setting. </p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/artificial-intelligence/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/artificial-intelligence.html"> <span class="article__title-text">The Role of AI in Cybersecurity</span><span class="posts__title-link">Read More ></span> </a> <p>Learn how cybersecurity tools integrate AI, the primary applications of AI, and the benefits of tools that integrate AI.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/kubernetes-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/kubernetes-security.html"> <span class="article__title-text">The Fundamentals of Kubernetes Security</span><span class="posts__title-link">Read More ></span> </a> <p>Kubernetes security is the application of techniques and processes to protect cloud-native applications running on Kubernetes (also known as K8s) from vulnerabilities or malicious actors.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/types-of-social-engineering-attacks/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/types-of-social-engineering-attacks.html"> <span class="article__title-text">Types of Social Engineering Attacks and how to prevent them</span><span class="posts__title-link">Read More ></span> </a> <p>Explore ten of the most common types of social engineering attacks and how to prevent them. </p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/three-pillars-of-observability/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/three-pillars-of-observability.html"> <span class="article__title-text">Three Pillars of Observability</span><span class="posts__title-link">Read More ></span> </a> <p>The three pillars of observability are logs, metrics, and traces. These three data outputs provide different insights into the health and functions of systems in cloud and microservices environments.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence.html"> <span class="article__title-text">Threat Intelligence</span><span class="posts__title-link">Read More ></span> </a> <p>Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor's motives, targets, and attack behaviors.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/zeus-malware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/zeus-malware.html"> <span class="article__title-text">The Zeus Trojan Malware — Definition and Prevention</span><span class="posts__title-link">Read More ></span> </a> <p>The two primary goals of the Zeus trojan horse virus are stealing people’s financial information and adding machines to a botnet.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/types-of-malware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/types-of-malware.html"> <span class="article__title-text">The Most Common Types of Malware</span><span class="posts__title-link">Read More ></span> </a> <p>While there are many different variations of malware, there are several types that you are more likely to encounter. </p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/threat-actor/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/threat-actor.html"> <span class="article__title-text">Threat Actor</span><span class="posts__title-link">Read More ></span> </a> <p>A threat actor, also known as a malicious actor, is any person or organization that intentionally causes harm in the digital sphere.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/threat-model/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/threat-model.html"> <span class="article__title-text">Threat Model</span><span class="posts__title-link">Read More ></span> </a> <p>A threat model evaluates threats and risks to information systems, identifies the likelihood that each threat will succeed and assesses the organization's ability to respond to each identified threat. </p> </div> </div> <div id="u" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">U</span> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/user-and-entity-behavior-analytics-ueba/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/user-and-entity-behavior-analytics-ueba.html"> <span class="article__title-text">User and Entity Behavior Analytics (UEBA)</span><span class="posts__title-link">Read More ></span> </a> <p>User and entity behavior analytics (UEBA) systems monitor an organization’s network, using AI and machine learning (ML) to analyze suspicious activity related to user and endpoint behavior that could indicate a security threat.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/data-gravity/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/data-gravity.html"> <span class="article__title-text">Understanding Data Gravity</span><span class="posts__title-link">Read More ></span> </a> <p>Data gravity is a term that captures how large volumes of data attract applications, services, and even more data.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/spoofing-vs-phishing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/spoofing-vs-phishing.html"> <span class="article__title-text">Understanding the Difference Between Spoofing vs Phishing</span><span class="posts__title-link">Read More ></span> </a> <p>Spoofing attacks resemble identity theft while phishing attacks attempt to steal sensitive information. </p> </div> </div> <div id="v" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">V</span> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/vulnerability-assessment/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/vulnerability-assessment.html"> <span class="article__title-text">Vulnerability Assessment</span><span class="posts__title-link">Read More ></span> </a> <p>Vulnerability assessment is the ongoing, regular process of defining, identifying, classifying and reporting cyber vulnerabilities across endpoints, workloads, and systems.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/vishing-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/vishing-attack.html"> <span class="article__title-text">Vishing: Definition and Prevention</span><span class="posts__title-link">Read More ></span> </a> <p>Vishing, a voice phishing attack, is the fraudulent use of phone calls and voice messages pretending to be from a reputable organization to convince individuals to reveal private information such as bank details and passwords.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/vulnerability-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/vulnerability-management.html"> <span class="article__title-text">Vulnerability Management</span><span class="posts__title-link">Read More ></span> </a> <p>Vulnerability management is the ongoing, regular process of identifying, assessing, reporting on, managing and remediating security risks to keep all systems and assets in a network protected. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/virtualization-vs-containerization/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/virtualization-vs-containerization.html"> <span class="article__title-text">Virtualization vs. Containerization: What’s the Difference?</span><span class="posts__title-link">Read More ></span> </a> <p>Learn the differences between containers and virtual machines (VMs), compare and contrast them, and review some use cases showing where one or the other is preferable</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/virtual-private-cloud/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/virtual-private-cloud.html"> <span class="article__title-text">Virtual Private Cloud (VPC)</span><span class="posts__title-link">Read More ></span> </a> <p>A VPC is a single compartment within the entirety of the public cloud of a certain provider, essentially a deposit box inside the bank’s vault. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/vulnerability-management-lifecycle/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/vulnerability-management-lifecycle.html"> <span class="article__title-text">Vulnerability Management Lifecycle</span><span class="posts__title-link">Read More ></span> </a> <p>There are five main stages in the vulnerability management lifecycle include: Assess, Prioritize, Act, Reassess, Improve.</p> </div> </div> <div id="w" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">W</span> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/identity-protection/windows-ntlm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/identity-protection/windows-ntlm.html"> <span class="article__title-text">Windows New Technology LAN Manager (NTLM)</span><span class="posts__title-link">Read More ></span> </a> <p>Windows New Technology LAN Manager (NTLM) is a suite of security protocols offered by Microsoft to authenticate users’ identity and protect the integrity and confidentiality of their activity.</p> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/endpoint-security/web-application-firewall-waf/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/endpoint-security/web-application-firewall-waf.html"> <span class="article__title-text">Web Application Firewall (WAF)</span><span class="posts__title-link">Read More ></span> </a> <p>A Web Application Firewall (WAF) is a security device designed to protect organizations at the application level by filtering, monitoring and analyzing HTTP and HTTPS traffic between the web application and the internet.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/devsecops/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/devsecops.html"> <span class="article__title-text">What is DevSecOps? Key Benefits and Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>DevSecOps is a philosophical framework that combines aspects of software development, security, and operations into a cohesive whole. With DevSecOps, developers are more aware of and responsible for maintaining security best practices within their code. It also means operations and security teams implement tools and policies that provide regular security checks throughout the continuous integration/continuous delivery (CI/CD) pipeline.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/managed-siem/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/managed-siem.html"> <span class="article__title-text">What Is Managed SIEM?: Managed Detection and Response for SIEM</span><span class="posts__title-link">Read More ></span> </a> <p>Managed SIEM gives you the functionalities of traditional SIEM but with the benefits of a managed service model. Along with the strengthened security posture that traditional SIEM affords your organization, you can offload the burden of managing complex SIEM technologies in-house.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-workload-protection-platform-cwpp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-workload-protection-platform-cwpp.html"> <span class="article__title-text">What Is a Cloud Workload Protection Platform (CWPP)?</span><span class="posts__title-link">Read More ></span> </a> <p>A cloud workload protection platform (CWPP) is a unified cloud security solution that offers continuous threat monitoring and detection for cloud workloads across different types of modern cloud environments.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/iac-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/iac-security.html"> <span class="article__title-text">What is Infrastructure as Code Security?</span><span class="posts__title-link">Read More ></span> </a> <p>Infrastructure as code security is the practice of addressing security configuration issues in the IaC layer rather than scanning deployed cloud resources.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/data-security-posture-management-dspm/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/data-security-posture-management-dspm.html"> <span class="article__title-text">What Is Data Security Posture Management (DSPM)?</span><span class="posts__title-link">Read More ></span> </a> <p>DSPM helps organizations manage their data across the cloud, monitor for risks, enforce security policies, and ensure regulatory compliance.</p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/file-integrity-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/file-integrity-monitoring.html"> <span class="article__title-text">What is File Integrity Monitoring?</span><span class="posts__title-link">Read More ></span> </a> <p>File integrity monitoring (FIM) is a security process that monitors and analyzes the integrity of critical assets, including file systems, directories, databases, network devices, the operating system (OS), OS components and software applications for signs of tampering or corruption, which may be an indication of a cyberattack.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/counter-adversary-operations-cao/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/counter-adversary-operations-cao.html"> <span class="article__title-text">What is CrowdStrike Counter Adversary Operations (CAO)?</span><span class="posts__title-link">Read More ></span> </a> <p>Counter Adversary Operations unites intelligence and threat hunting teams to disrupt modern adversaries and raise their cost of doing business.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/data-protection/data-leakage/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/data-protection/data-leakage.html"> <span class="article__title-text">What is Data Leakage?</span><span class="posts__title-link">Read More ></span> </a> <p>Data leakage refers to the unauthorized transfer of data from inside an organization to an external destination.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/managed-security/managed-service-provider-msp/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/managed-security/managed-service-provider-msp.html"> <span class="article__title-text">What is a Managed Service Provider (MSP)?</span><span class="posts__title-link">Read More ></span> </a> <p>Managed service providers (MSPs) offer a wide range of IT and cybersecurity services to help organizations manage and optimize their technology infrastructure.</p> </div> <div class="article" cs-item data-category="AI & Machine Learning"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/automated-intelligence/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/automated-intelligence.html"> <span class="article__title-text">What is Automated Intelligence?</span><span class="posts__title-link">Read More ></span> </a> <p>Learn more about how traditional defense measures have evolved to integrate automated systems that use AI/machine learning (ML) and data analytics and the role and benefits of automated intelligence as a part of a modern cybersecurity arsenal.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/wiper-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/wiper-attack.html"> <span class="article__title-text">Wiper Attacks</span><span class="posts__title-link">Read More ></span> </a> <p>Wiper attacks are malware-based attacks designed to permanently delete or corrupt data on targeted systems.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/soc-framework/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/soc-framework.html"> <span class="article__title-text">What is a Security Operations Center (SOC) Framework?</span><span class="posts__title-link">Read More ></span> </a> <p>A SOC framework acts like a blueprint, defining the systematic approach a SOC ought to employ as it detects, analyzes, and responds to cybersecurity threats.</p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/soc-reports/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/soc-reports.html"> <span class="article__title-text">What are Security Operations Center (SOC) Reports?</span><span class="posts__title-link">Read More ></span> </a> <p>SOC reports distill complex security data into actionable intelligence, keeping you ahead of threats.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/mobile-malware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/mobile-malware.html"> <span class="article__title-text">What is Mobile Malware?</span><span class="posts__title-link">Read More ></span> </a> <p>Mobile malware is malicious software designed to target mobile devices. Click here to read about the different types and distribution methods.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/whaling-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/whaling-attack.html"> <span class="article__title-text">What is a Whaling Attack? (Whaling Phishing)</span><span class="posts__title-link">Read More ></span> </a> <p>A whaling attack is a social engineering attack against a specific executive or senior employee with the purpose of stealing money or information, or gaining access to the person’s computer in order to execute further attacks.</p> </div> <div class="article" cs-item data-category="Data Protection"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/secops/data-protection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/secops/data-protection.html"> <span class="article__title-text">What is Data Protection?</span><span class="posts__title-link">Read More ></span> </a> <p>Data protection is a process that involves the policies, procedures and technologies used to secure data from unauthorized access, alteration or destruction.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/trickbots/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/trickbots.html"> <span class="article__title-text">What is TrickBot Malware?</span><span class="posts__title-link">Read More ></span> </a> <p>TrickBot malware is a banking Trojan released in 2016 that has since evolved into a modular, multi-phase malware capable of a wide variety of illicit operations.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/supply-chain-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/supply-chain-attack.html"> <span class="article__title-text">What Is a Supply Chain Attack?</span><span class="posts__title-link">Read More ></span> </a> <p>A supply chain attack is a type of cyberattack that targets a trusted third party vendor who offers services or software vital to the supply chain. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/security-information-and-event-management-siem/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/security-information-and-event-management-siem.html"> <span class="article__title-text">What Is Security Information and Event Management (SIEM)?</span><span class="posts__title-link">Read More ></span> </a> <p>Security information and event management (SIEM) is a set of tools and services that combine security events management (SEM) and security information management (SIM) capabilities that helps organizations recognize potential security threats and vulnerabilities before business disruptions occur.</p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/cyber-resilience/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/cyber-resilience.html"> <span class="article__title-text">What Is Cyber Resilience?</span><span class="posts__title-link">Read More ></span> </a> <p>Cyber resilience is the concept that describes an organization’s ability to minimize the impact of an adverse cyber event and restore their operational systems to maintain business continuity.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/credential-harvesting/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/credential-harvesting.html"> <span class="article__title-text">What Is Credential Harvesting?</span><span class="posts__title-link">Read More ></span> </a> <p>Credential harvesting is a cyberattack technique where cybercriminals gather user credentials — such as user IDs, email addresses, passwords, and other login information — en masse.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/adware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/adware.html"> <span class="article__title-text">What is Adware and How To Remove It</span><span class="posts__title-link">Read More ></span> </a> <p>Adware — or advertising-supported software — is automated, unwanted software designed to monitor online user behavior and bombard them with targeted advertisements, banners and pop-ups. </p> </div> <div class="article" cs-item data-category="Threat Intelligence & Hunting"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/threat-intelligence-feeds/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/threat-intelligence-feeds.html"> <span class="article__title-text">What is a Threat Intelligence Feed?</span><span class="posts__title-link">Read More ></span> </a> <p>A threat intelligence feed is a real-time, continuous data stream that gathers information related to cyber risks or threats.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/seo-poisoning/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/seo-poisoning.html"> <span class="article__title-text">What Is SEO Poisoning?</span><span class="posts__title-link">Read More ></span> </a> <p>SEO poisoning is a technique used by threat actors to increase the prominence of their malicious websites, making them look more authentic to consumers.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/downgrade-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/downgrade-attack.html"> <span class="article__title-text">What are Downgrade Attacks?</span><span class="posts__title-link">Read More ></span> </a> <p>In a downgrade attack, an attacker forces the target system to switch to a low-quality, less secure mode of operation.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-monitoring.html"> <span class="article__title-text">What Is Cloud Monitoring?</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud monitoring is the practice of measuring, evaluating, monitoring, and managing workloads inside cloud tenancies against specific metrics and thresholds. It can use either manual or automated tools to verify the cloud is fully available and operating properly.</p> </div> <div class="article" cs-item data-category="Social Engineering"> <a class="article__title" href="/en-us/cybersecurity-101/threat-intelligence/business-email-compromise-bec/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/threat-intelligence/business-email-compromise-bec.html"> <span class="article__title-text">What Is Business Email Compromise (BEC)?</span><span class="posts__title-link">Read More ></span> </a> <p>Business email compromise (BEC) is a cyberattack technique whereby adversaries assume the digital identity of a trusted persona in an attempt to trick employees or customers into taking a desired action, such as making a payment or purchase, sharing data or divulging sensitive information.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/living-off-the-land-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/living-off-the-land-attack.html"> <span class="article__title-text">What Are Living off the Land (LOTL) Attacks?</span><span class="posts__title-link">Read More ></span> </a> <p>Living off the land (LOTL) is a fileless malware cyberattack technique where the cybercriminal uses native, legitimate tools within the victim’s system to sustain and advance an attack.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/devops-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/devops-monitoring.html"> <span class="article__title-text">What is DevOps Monitoring?</span><span class="posts__title-link">Read More ></span> </a> <p>DevOps monitoring is the practice of tracking and measuring the performance and health of systems and applications in order to identify and correct issues early.</p> </div> <div class="article" cs-item data-category="Platform Security"> <a class="article__title" href="/en-us/cybersecurity-101/what-is-cybersecurity/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/what-is-cybersecurity.html"> <span class="article__title-text">What Is Cybersecurity? Definition, Types, Tips, and More</span><span class="posts__title-link">Read More ></span> </a> <p>Cybersecurity is the act of defending digital assets, including networks, systems, computers and data, from cyberattacks.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/infrastructure-monitoring/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/infrastructure-monitoring.html"> <span class="article__title-text">What Is Infrastructure Monitoring?</span><span class="posts__title-link">Read More ></span> </a> <p>Infrastructure Monitoring allows teams to collect operational and performance data from their systems to diagnose, fix, and improve them. </p> </div> <div class="article" cs-item data-category="Managed Security"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/logging-as-a-service-laas/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/logging-as-a-service-laas.html"> <span class="article__title-text">What is Logging as a Service (LaaS)?</span><span class="posts__title-link">Read More ></span> </a> <p>Logging as a service (LaaS) is a solution that centralizes the collection, analysis, monitoring and management of logs. In this article, you’ll learn what LaaS is and why it's important. You’ll also discover the differences between LaaS and traditional log monitoring solutions, and how to choose a LaaS provider. </p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-rotation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-rotation.html"> <span class="article__title-text">What Is Log Rotation?</span><span class="posts__title-link">Read More ></span> </a> <p>Learn about the basics of log rotation—why it’s important, and what you can do with your older log files.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-aggregation/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-aggregation.html"> <span class="article__title-text">What is Log Aggregation?</span><span class="posts__title-link">Read More ></span> </a> <p>Log aggregation is the mechanism for capturing, normalizing, and consolidating logs from different sources to a centralized platform for correlating and analyzing the data.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-management/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-management.html"> <span class="article__title-text">What is Log Management? The Importance of logging and best practices</span><span class="posts__title-link">Read More ></span> </a> <p>Log management is the practice of continuously gathering, storing, processing, synthesizing and analyzing data from disparate programs and applications.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/log-parsing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/log-parsing.html"> <span class="article__title-text">What is Log Parsing?</span><span class="posts__title-link">Read More ></span> </a> <p>Log parsing is the process of converting log data into a common format to make them machine-readable. </p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/web-server-logs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/web-server-logs.html"> <span class="article__title-text">Web Server Logs</span><span class="posts__title-link">Read More ></span> </a> <p>A web server log is a text document that contains a record of all activity related to a specific web server over a defined period of time.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/data-logging/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/data-logging.html"> <span class="article__title-text">What is Data Logging?</span><span class="posts__title-link">Read More ></span> </a> <p>Data logging is the process of capturing, storing and displaying one or more datasets to analyze activity, identify trends and help predict future events.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/detection-engineering/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/detection-engineering.html"> <span class="article__title-text">What is Detection Engineering?</span><span class="posts__title-link">Read More ></span> </a> <p>Detection engineering is the process of identifying threats before they can do significant damage. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/common-vulnerabilities-and-exposures-cve/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/common-vulnerabilities-and-exposures-cve.html"> <span class="article__title-text">What Is CVE? Common Vulnerabilities & Exposures</span><span class="posts__title-link">Read More ></span> </a> <p>Common Vulnerabilities and Exposures (CVEs) is a framework and international effort to maintain updated registry of all known computer security vulnerabilities and exposures.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/ransomware/how-ransomware-allows-hackers-to-compromise-data/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/ransomware/how-ransomware-allows-hackers-to-compromise-data.html"> <span class="article__title-text">What Does Ransomware Allow Hackers to Do?</span><span class="posts__title-link">Read More ></span> </a> <p>In a ransomware attack, hackers use malware to encrypt, delete or manipulate data, intellectual property or personal information. This allows attackers to hold the information, device or system digitally hostage until the victim meets the cybercriminal’s ransom demands, which usually involve secure, untraceable payment.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/domain-spoofing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/domain-spoofing.html"> <span class="article__title-text">What is Domain Spoofing?</span><span class="posts__title-link">Read More ></span> </a> <p>Domain spoofing is a form of phishing where an attacker impersonates a known business or person with fake website or email domain to fool people into the trusting them.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/cyber-kill-chain/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/cyber-kill-chain.html"> <span class="article__title-text">What is the Cyber Kill Chain? Process & Model</span><span class="posts__title-link">Read More ></span> </a> <p>The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops enemy activity. </p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-encryption/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-encryption.html"> <span class="article__title-text">What is Cloud Encryption?</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud encryption is the process of transforming data from its original plain text format to an unreadable format before it is transferred to and stored in the cloud.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/real-user-monitoring-rum/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/real-user-monitoring-rum.html"> <span class="article__title-text">What Is Real User Monitoring (RUM)?</span><span class="posts__title-link">Read More ></span> </a> <p>Real User Monitoring (RUM) monitors application performance by capturing every user interaction on a website or mobile application. In this article, we’ll learn about RUM and why businesses need it. We’ll consider its benefits and how you can choose a RUM solution for your business. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/cryptojacking/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/cryptojacking.html"> <span class="article__title-text">What is Cryptojacking?</span><span class="posts__title-link">Read More ></span> </a> <p>Cryptojacking is the unauthorized use of a person's or organization's computing resources to mine cryptocurrency.</p> </div> <div class="article" cs-item data-category="Observability"> <a class="article__title" href="/en-us/cybersecurity-101/observability/application-logs/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/observability/application-logs.html"> <span class="article__title-text">What is an Application Log?</span><span class="posts__title-link">Read More ></span> </a> <p>Software applications generate logs when something occurs within (or affects) the application. IT teams typically use application log data to investigate outages, troubleshoot bugs, or analyze security incidents.</p> </div> <div class="article" cs-item data-category="Cloud Security"> <a class="article__title" href="/en-us/cybersecurity-101/cloud-security/cloud-analytics/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cloud-security/cloud-analytics.html"> <span class="article__title-text">What is Cloud Analytics?</span><span class="posts__title-link">Read More ></span> </a> <p>Cloud analytics is an umbrella term encompassing data analytics operations that are carried out on a cloud platform to produce actionable business insights.</p> </div> <div class="article" cs-item data-category="Next-Gen SIEM"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/centralized-logging/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/centralized-logging.html"> <span class="article__title-text">What is Centralized Logging?</span><span class="posts__title-link">Read More ></span> </a> <p>Centralized logging is the process of collecting logs from networks, infrastructure, and applications into a single location for storage and analysis. </p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/spyware/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/spyware.html"> <span class="article__title-text">What is Spyware?</span><span class="posts__title-link">Read More ></span> </a> <p>Spyware is a type of unwanted, malicious software that infects a computer or other device and collects information about a user’s web activity without their knowledge or consent.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/spoofing-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/spoofing-attack.html"> <span class="article__title-text">What is a Spoofing Attack?</span><span class="posts__title-link">Read More ></span> </a> <p>Spoofing is when a cybercriminal disguises communication or activity from a malicious source and presents it as a familiar or trusted source.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/pretexting-attack/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/pretexting-attack.html"> <span class="article__title-text">What is Pretexting?</span><span class="posts__title-link">Read More ></span> </a> <p>Pretexting is a form of social engineering in which an attacker gets access to information, a system or a service through deceptive means. The attacker will present a false scenario — or pretext — to gain the victim’s trust and may pretend to be an experienced investor, HR representative, IT specialist or other seemingly legitimate source.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/polymorphic-virus/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/polymorphic-virus.html"> <span class="article__title-text">What is a Polymorphic Virus? Detection and Best Practices</span><span class="posts__title-link">Read More ></span> </a> <p>A polymorphic virus, sometimes referred to as a metamorphic virus, is a type of malware that is programmed to repeatedly mutate its appearance or signature files through new decryption routines.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/trojans/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/trojans.html"> <span class="article__title-text">What is a Trojan Horse?</span><span class="posts__title-link">Read More ></span> </a> <p>A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code. Attackers can export files, modify data, and delete files on your device.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/social-engineering/spear-phishing-vs-phishing/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/social-engineering/spear-phishing-vs-phishing.html"> <span class="article__title-text">What's the Difference Between Spear Phishing vs. Phishing?</span><span class="posts__title-link">Read More ></span> </a> <p>Spear phishing is a targeted attack on a specific person or organization, whereas general phishing campaigns are sent to a large volume of people. </p> </div> <div class="article" cs-item data-category="Exposure Management"> <a class="article__title" href="/en-us/cybersecurity-101/exposure-management/defense-in-depth/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/exposure-management/defense-in-depth.html"> <span class="article__title-text">What is Defense in Depth?</span><span class="posts__title-link">Read More ></span> </a> <p>Defense in depth provides intensive security measures using a layered approach to protect your company from cyberattacks.</p> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/malware/botnets/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/malware/botnets.html"> <span class="article__title-text">What is a Botnet?</span><span class="posts__title-link">Read More ></span> </a> <p>A botnet is a network of computers infected with malware that are controlled by a bot herder.</p> </div> </div> <div id="x" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">X</span> </div> <div class="article" cs-item data-category="Endpoint Security & XDR"> <a class="article__title" href="/en-us/cybersecurity-101/next-gen-siem/xdr-vs-siem-vs-soar/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/next-gen-siem/xdr-vs-siem-vs-soar.html"> <span class="article__title-text">XDR vs SIEM vs SOAR</span><span class="posts__title-link">Read More ></span> </a> <p>XDR, SIEM, and SOAR address similar use cases but take fundamentally different approaches. Learn how they relate and how they differ.</p> </div> </div> <div id="z" class="postGroup" style="display: block;"> <div class="letter"><span class="letter__span">Z</span> </div> <div class="article" cs-item data-category="Cyberattacks"> <a class="article__title" href="/en-us/cybersecurity-101/cyberattacks/zero-day-exploit/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/cyberattacks/zero-day-exploit.html"> <span class="article__title-text">Zero-Day Exploit</span><span class="posts__title-link">Read More ></span> </a> <p>A Zero-Day Exploit is the technique or attack a malicious actor deploys to leverage an unknown security vulnerability to gain access into a system.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust-security/zero-trust-architecture/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust-security/zero-trust-architecture.html"> <span class="article__title-text">Zero Trust Architecture</span><span class="posts__title-link">Read More ></span> </a> <p>A Zero Trust Architecture refers to the way network devices and services are structured to enable a Zero Trust security model.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust-security/zero-trust-network-access-ztna/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust-security/zero-trust-network-access-ztna.html"> <span class="article__title-text">Zero Trust Network Access (ZTNA)</span><span class="posts__title-link">Read More ></span> </a> <p>Zero Trust network access (ZTNA) is an IT technology solution that requires all users to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust-security/zero-trust-vs-sase/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust-security/zero-trust-vs-sase.html"> <span class="article__title-text">Zero Trust vs. SASE</span><span class="posts__title-link">Read More ></span> </a> <p>We will take a closer look at Zero Trust and SASE and answer some common questions that organizations have when incorporating these into their overarching cybersecurity framework.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust-security.html"> <span class="article__title-text">Zero Trust Security</span><span class="posts__title-link">Read More ></span> </a> <p>Zero Trust is a security concept that requires all users to be authenticated and authorized before being granted access to applications and data.</p> </div> <div class="article" cs-item data-category="Identity Protection"> <a class="article__title" href="/en-us/cybersecurity-101/zero-trust/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101/zero-trust.html"> <span class="article__title-text">ZeroSecurity</span><span class="posts__title-link">Read More ></span> </a> <p>Identity protection, also known as identity security, is a comprehensive solution that protects all types of identities within the enterprise</p> </div> </div> </div> <p class="filterContent__no_results" style="display: none;"></p> </div> </div> </div> </div> <div style="display: none;"> </div> </div> </div> </div> </div> </div> <div class="experiencefragment aem-GridColumn aem-GridColumn--default--12"> <div id="experiencefragment-f4f97b4d64" class="cmp-experiencefragment cmp-experiencefragment--footer"> <div id="container-c6d8ac4133" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false"> <div class="container responsivegrid"> <div id="container-8fe38349bc" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false"> <div class="teaser teaser--footer-redesign"> <div data-cmp-is="teaser" id="nav-teaser-footer-trial" class="cmp-teaser " data-background-path="https://assets.crowdstrike.com/is/image/crowdstrikeinc/try-free-footer" data-background-path-tablet="https://assets.crowdstrike.com/is/image/crowdstrikeinc/try-free-footer" data-background-path-mobile="https://assets.crowdstrike.com/is/image/crowdstrikeinc/try-free-footer" data-background-path-large-desktop="https://assets.crowdstrike.com/is/image/crowdstrikeinc/try-free-footer" data-target-location="false"> <div class="cmp-teaser__video-title"> <h2 class="cmp-teaser__title "> <span> <div data-cmp-hook-teaser="title">Try CrowdStrike free for 15 days</div> </span> </h2> </div> <div class="cmp-teaser__background" data-cmp-hook-teaser="background-container" data-background-path="https://assets.crowdstrike.com/is/image/crowdstrikeinc/try-free-footer"></div> <div class="cmp-teaser__content" data-cmp-hook-teaser="content"> <h2 class="cmp-teaser__title "> <span> <div data-cmp-hook-teaser="title">Try CrowdStrike free for 15 days</div> </span> </h2> <div class="cmp-teaser__action-container" data-cmp-hook-teaser="actions"> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link " href="https://www.crowdstrike.com/en-us/products/trials/try-falcon-prevent/?ft-trial" color-palette-text-color="#FFFFFF" color-palette-border-color="#EC0000" color-palette-background-color="#EC0000" color-palette-text-hover-color="#FFFFFF" color-palette-border-hover-color="#D30000" color-palette-background-hover-color="#D30000" data-cmp-hook-action="action"> Start free trial <svg class="cmp-teaser__action-link__internal-icon "> <use href="#cta-arrow-white" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> </a> </div> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link cmp-teaser__action-link--white-arrow" href="https://www.crowdstrike.com/en-us/contact-us" color-palette-text-color="#FFFFFF" color-palette-border-color="#FFFFFF" color-palette-text-hover-color="#000000" color-palette-border-hover-color="#000000" color-palette-background-hover-color="#FFFFFF" data-cmp-hook-action="action"> Contact us <svg class="cmp-teaser__action-link__internal-icon "> <use href="#cta-arrow-white" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> </a> </div> <div class="cmp-teaser__action"> <a class="cmp-teaser__action-link " href="https://www.crowdstrike.com/en-us/products" color-palette-text-color="#FFFFFF" color-palette-text-hover-color="#FFFFFF" data-cmp-hook-action="action"> View pricing <svg class="cmp-teaser__action-link__internal-icon--rtl "> <use href="#cta-arrow-white-left" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#cta-arrow-white-left"></use> </svg> <svg class="cmp-teaser__action-link__internal-icon"> <use href="#chevron-right-red" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-red"></use> </svg> </a> </div> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="container responsivegrid container--centered"> <div id="container-3333d51310" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="container responsivegrid container--flex container--horizontal-space-between container--vertical-center"> <div id="container-0fc14b1b99" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="image image--redesign-footer"> <div data-cmp-is="image" data-cmp-dmimage data-asset-id="d1c3eee8-948a-43b2-b54d-4079f21d919e" data-title="CrowdStrike Logo" data-width="134" id="nav-footer-logo" data-cmp-hook-image="imageV3" class="cmp-image" itemscope itemtype="http://schema.org/ImageObject" data-target-location="false"> <a class="cmp-image__link" href="/en-us/" title="CrowdStrike Logo" data-title="CrowdStrike Logo" target="_self"> <img src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/black-primary-crowdstrike-logo-1-addedPadding-3?ts=1740510886806&dpr=off" class="cmp-image__image" itemprop="contentUrl" loading="lazy" alt="CrowdStrike Logo"/> <svg class="cmp-image__play-icon__image-alt"> <use href="#play-alt" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#play-alt"></use> </svg> </a> </div> <div style="display: none;"> </div> </div> <div class="container responsivegrid container--flex container--horizontal-end container--vertical-center container--hide-mobile"> <div id="container-0ff8e57f8c" class="cmp-container" data-cmp-is="simple-container" data-is-transparent-header="false" data-target-location="false"> <div class="sociallinks sociallinks--redesign-footer"> <div class="cmp-social-links" id="nav-sociallink" data-target-location="false"> <a class="cmp-social-links__link" href="https://www.linkedin.com/company/crowdstrike" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#linked-in" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#linked-in"></use> </svg> </a> <a class="cmp-social-links__link" href="https://twitter.com/CrowdStrike" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#twitter-x-logo" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#twitter-x-logo"></use> </svg> </a> <a class="cmp-social-links__link" href="https://www.facebook.com/CrowdStrike/" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#facebook" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#facebook"></use> </svg> </a> <a class="cmp-social-links__link" href="https://www.instagram.com/crowdstrike/?hl=en" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#instagram" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#instagram"></use> </svg> </a> <a class="cmp-social-links__link" href="http://www.youtube.com/user/CrowdStrike" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#youtube" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#youtube"></use> </svg> </a> </div> <div style="display: none;"> </div> </div> </div> </div> </div> </div> <div class="separator"><div id="separator-separator-247fc406b8" class="cmp-separator" data-is-vertical="false" data-start-gradient="#000000" data-end-gradient="#000000" data-separator-height="2" data-separator-width="1" data-cmp-is="separator" data-is-gradient data-target-location="false"> </div> </div> <div class="accordion panelcontainer accordion--footer-redesign"> <div id="accordion-3e869005b9" class="cmp-accordion" data-cmp-is="accordion" data-cmp-data-layer="{"accordion-3e869005b9":{"shownItems":[],"@type":"crowdstrike/components/content/accordion/v1/accordion","repo:modifyDate":"2025-02-25T19:14:46Z"}}" data-cmp-single-expansion data-placeholder-text="false" data-target-location="false"> <div class="cmp-accordion__item" data-cmp-hook-accordion="item" data-cmp-data-layer="{"accordion-3e869005b9-item-17541e824c":{"@type":"crowdstrike/components/content/accordion/v1/accordion/item","repo:modifyDate":"2025-02-25T19:14:46Z","dc:title":"Get Started"}}" id="accordion-3e869005b9-item-17541e824c"> <h3 class="cmp-accordion__header"> <button id="accordion-3e869005b9-item-17541e824c-button" class="cmp-accordion__button" aria-controls="accordion-3e869005b9-item-17541e824c-panel" data-cmp-hook-accordion="button"> <span class="cmp-accordion__title">Get Started</span> <span class="cmp-accordion__icon"> <svg class="cmp-accordion__icon__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#black-minus" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-minus"></use> <use data-cmp-hook-accordion="collapsed-icon" href="#black-plus-in-circle" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-plus-in-circle"></use> </svg> <svg class="cmp-accordion_marketo-landing__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#chevron-right-black" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-black"></use> </svg> </span> </button> </h3> <div data-cmp-hook-accordion="panel" id="accordion-3e869005b9-item-17541e824c-panel" class="cmp-accordion__panel cmp-accordion__panel--hidden" role="region" aria-labelledby="accordion-3e869005b9-item-17541e824c-button"><div class="list list--redesign-footer"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-list-footer-get-started"> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/products/"> <span class="cmp-list__item-link__text"> Pricing</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/free-trial-guide/"> <span class="cmp-list__item-link__text"> Free Trial Guide</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/products/bundles/falcon-flex/"> <span class="cmp-list__item-link__text"> Falcon Flex</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://www.crowdstrike.com/crowdstrike-financial-services/"> <span class="cmp-list__item-link__text"> Financing</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://marketplace.crowdstrike.com/"> <span class="cmp-list__item-link__text"> CrowdStrike Marketplace</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://www.crowdstrike.com/en-us/solutions/small-business/"> <span class="cmp-list__item-link__text"> Small Business</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://www.crowdstrike.com/en-us/solutions/federal-government/"> <span class="cmp-list__item-link__text"> Federal Government</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://www.crowdstrike.com/en-us/solutions/state-local-government/"> <span class="cmp-list__item-link__text"> State & Local Government</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> <div class="cmp-accordion__item" data-cmp-hook-accordion="item" data-cmp-data-layer="{"accordion-3e869005b9-item-145077fd0e":{"@type":"crowdstrike/components/content/accordion/v1/accordion/item","repo:modifyDate":"2025-02-25T19:14:47Z","dc:title":"Company"}}" id="accordion-3e869005b9-item-145077fd0e"> <h3 class="cmp-accordion__header"> <button id="accordion-3e869005b9-item-145077fd0e-button" class="cmp-accordion__button" aria-controls="accordion-3e869005b9-item-145077fd0e-panel" data-cmp-hook-accordion="button"> <span class="cmp-accordion__title">Company</span> <span class="cmp-accordion__icon"> <svg class="cmp-accordion__icon__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#black-minus" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-minus"></use> <use data-cmp-hook-accordion="collapsed-icon" href="#black-plus-in-circle" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-plus-in-circle"></use> </svg> <svg class="cmp-accordion_marketo-landing__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#chevron-right-black" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-black"></use> </svg> </span> </button> </h3> <div data-cmp-hook-accordion="panel" id="accordion-3e869005b9-item-145077fd0e-panel" class="cmp-accordion__panel cmp-accordion__panel--hidden" role="region" aria-labelledby="accordion-3e869005b9-item-145077fd0e-button"><div class="list list--redesign-footer"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-list-footer-company"> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/about-us/"> <span class="cmp-list__item-link__text"> About Us</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/about-us/executive-team/"> <span class="cmp-list__item-link__text"> Executive Leadership</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/about-us/board-of-directors/"> <span class="cmp-list__item-link__text"> Board of Directors</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/news/"> <span class="cmp-list__item-link__text"> Newsroom</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://ir.crowdstrike.com/"> <span class="cmp-list__item-link__text"> Investor Relations</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://crowdstrikeracing.com/"> <span class="cmp-list__item-link__text"> CrowdStrike Racing & F1</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/about-us/environmental-social-governance/"> <span class="cmp-list__item-link__text"> Environmental, Social & Governance</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/careers/"> <span class="cmp-list__item-link__text"> Careers</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> <div class="cmp-accordion__item" data-cmp-hook-accordion="item" data-cmp-data-layer="{"accordion-3e869005b9-item-a5066ca399":{"@type":"crowdstrike/components/content/accordion/v1/accordion/item","repo:modifyDate":"2025-02-25T19:14:47Z","dc:title":"Partners"}}" id="accordion-3e869005b9-item-a5066ca399"> <h3 class="cmp-accordion__header"> <button id="accordion-3e869005b9-item-a5066ca399-button" class="cmp-accordion__button" aria-controls="accordion-3e869005b9-item-a5066ca399-panel" data-cmp-hook-accordion="button"> <span class="cmp-accordion__title">Partners</span> <span class="cmp-accordion__icon"> <svg class="cmp-accordion__icon__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#black-minus" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-minus"></use> <use data-cmp-hook-accordion="collapsed-icon" href="#black-plus-in-circle" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-plus-in-circle"></use> </svg> <svg class="cmp-accordion_marketo-landing__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#chevron-right-black" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-black"></use> </svg> </span> </button> </h3> <div data-cmp-hook-accordion="panel" id="accordion-3e869005b9-item-a5066ca399-panel" class="cmp-accordion__panel cmp-accordion__panel--hidden" role="region" aria-labelledby="accordion-3e869005b9-item-a5066ca399-button"><div class="list list--redesign-footer"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-list-footer-partners"> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/partners/partner-program/"> <span class="cmp-list__item-link__text"> Partner Programs</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/partners/service-providers/"> <span class="cmp-list__item-link__text"> Service Providers</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/partners/strategic-tech-partners/"> <span class="cmp-list__item-link__text"> Strategic Technology</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/partners/channel-partners/"> <span class="cmp-list__item-link__text"> Channel & Distributors</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/partners/become-a-partner/"> <span class="cmp-list__item-link__text"> Become a Partner</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> <div class="cmp-accordion__item" data-cmp-hook-accordion="item" data-cmp-data-layer="{"accordion-3e869005b9-item-2052895272":{"@type":"crowdstrike/components/content/accordion/v1/accordion/item","repo:modifyDate":"2025-02-25T19:14:47Z","dc:title":"Existing Customers"}}" id="accordion-3e869005b9-item-2052895272"> <h3 class="cmp-accordion__header"> <button id="accordion-3e869005b9-item-2052895272-button" class="cmp-accordion__button" aria-controls="accordion-3e869005b9-item-2052895272-panel" data-cmp-hook-accordion="button"> <span class="cmp-accordion__title">Existing Customers</span> <span class="cmp-accordion__icon"> <svg class="cmp-accordion__icon__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#black-minus" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-minus"></use> <use data-cmp-hook-accordion="collapsed-icon" href="#black-plus-in-circle" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-plus-in-circle"></use> </svg> <svg class="cmp-accordion_marketo-landing__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#chevron-right-black" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-black"></use> </svg> </span> </button> </h3> <div data-cmp-hook-accordion="panel" id="accordion-3e869005b9-item-2052895272-panel" class="cmp-accordion__panel cmp-accordion__panel--hidden" role="region" aria-labelledby="accordion-3e869005b9-item-2052895272-button"><div class="list list--redesign-footer"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-list-footer-customers"> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://supportportal.crowdstrike.com/"> <span class="cmp-list__item-link__text"> Support Portal</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://developer.crowdstrike.com/"> <span class="cmp-list__item-link__text"> Developer Portal</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> <div class="cmp-accordion__item" data-cmp-hook-accordion="item" data-cmp-data-layer="{"accordion-3e869005b9-item-58986197a0":{"@type":"crowdstrike/components/content/accordion/v1/accordion/item","repo:modifyDate":"2025-02-25T19:14:47Z","dc:title":"Support"}}" id="accordion-3e869005b9-item-58986197a0"> <h3 class="cmp-accordion__header"> <button id="accordion-3e869005b9-item-58986197a0-button" class="cmp-accordion__button" aria-controls="accordion-3e869005b9-item-58986197a0-panel" data-cmp-hook-accordion="button"> <span class="cmp-accordion__title">Support</span> <span class="cmp-accordion__icon"> <svg class="cmp-accordion__icon__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#black-minus" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-minus"></use> <use data-cmp-hook-accordion="collapsed-icon" href="#black-plus-in-circle" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#black-plus-in-circle"></use> </svg> <svg class="cmp-accordion_marketo-landing__icon"> <use data-cmp-hook-accordion="expanded-icon" href="#chevron-right-black" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#chevron-right-black"></use> </svg> </span> </button> </h3> <div data-cmp-hook-accordion="panel" id="accordion-3e869005b9-item-58986197a0-panel" class="cmp-accordion__panel cmp-accordion__panel--hidden" role="region" aria-labelledby="accordion-3e869005b9-item-58986197a0-button"><div class="list list--redesign-footer"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-list-footer-support"> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="tel:18885128906"> <span class="cmp-list__item-link__text"> Call 1-888-512-8906 (US)</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/services/experienced-a-breach/"> <span class="cmp-list__item-link__text"> Experienced a Breach?</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/contact-us/"> <span class="cmp-list__item-link__text"> Contact Us</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="https://hello.crowdstrike.com/calendar/team/t/91"> <span class="cmp-list__item-link__text"> Schedule a Meeting</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/products/faq/"> <span class="cmp-list__item-link__text"> FAQs</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> </div> </div> <div class="container responsivegrid container--hide-tablet container--hide-desktop"> <div id="container-f1d817f187" class="cmp-container" data-cmp-is="simple-container" data-padding-top-mobile="8" data-is-transparent-header="false" data-target-location="false"> <div class="sociallinks sociallinks--redesign-footer"> <div class="cmp-social-links" id="nav-sociallink" data-target-location="false"> <a class="cmp-social-links__link" href="https://www.linkedin.com/company/crowdstrike" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#linked-in" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#linked-in"></use> </svg> </a> <a class="cmp-social-links__link" href="https://twitter.com/CrowdStrike" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#twitter-x-logo" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#twitter-x-logo"></use> </svg> </a> <a class="cmp-social-links__link" href="https://www.facebook.com/CrowdStrike/" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#facebook" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#facebook"></use> </svg> </a> <a class="cmp-social-links__link" href="https://www.instagram.com/crowdstrike/?hl=en" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#instagram" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#instagram"></use> </svg> </a> <a class="cmp-social-links__link" href="http://www.youtube.com/user/CrowdStrike" target="_blank" rel="noopener noreferrer"> <svg class="cmp-social-links__link__icon"> <use href="#youtube" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#youtube"></use> </svg> </a> </div> <div style="display: none;"> </div> </div> </div> </div> <div class="container responsivegrid container--flex container--flex-direction-column container--flex-direction-row-reverse-desktop container--horizontal-start container--vertical-start container--vertical-center-desktop container--column-gap-24"> <div id="container-4ac65affdd" class="cmp-container" data-cmp-is="simple-container" data-padding-top="56" data-padding-top-tablet="64" data-padding-top-mobile="56" data-padding-bottom="32" data-is-transparent-header="false" data-target-location="false"> <div class="languagenavigation languagenavigation--gradient"> <nav data-cmp-data-layer="{"nav-languagenavigation":{"@type":"core/wcm/components/languagenavigation/v1/languagenavigation","repo:modifyDate":"2025-02-25T19:14:47Z"}}" data-cmp-is="language-navigation" id="nav-languagenavigation" class="cmp-languagenavigation" data-target-location="false"> <div class="button cmp-languagenavigation__wrapper"> <button class="cmp-button cmp-languagenavigation__item-link"> <svg class="cmp-button__text__internal-icon"> <use href="#globe" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#globe"></use> </svg> <span class="cmp-button__text">English (US)</span> <svg class="cmp-button__text__internal-icon"> <use href="#dropdown-chevron-black" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#dropdown-chevron-black"></use> </svg> </button> </div> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-de cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-DE cmp-languagenavigation__item--langcode-de-DE cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-7ddde525af":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-10-04T08:05:25Z","dc:title":"Deutsch","xdm:linkURL":"/de-de/cybersecurity-101/","xdm:language":"de-DE"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/de/de-de/cybersecurity-101.html" data-item-url="/content/crowdstrike-www/locale-sites/de/de-de/cybersecurity-101.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="de-DE" lang="de-DE" rel="alternate" href="/de-de/cybersecurity-101/">Deutsch</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-en cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-AU cmp-languagenavigation__item--langcode-en-AU cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-660312f9e0":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:38:27Z","dc:title":"English (AU)","xdm:linkURL":"/en-au/","xdm:language":"en-AU"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/au/en-au.html" data-item-url="/content/crowdstrike-www/locale-sites/au/en-au.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="en-AU" lang="en-AU" rel="alternate" href="/en-au/">English (AU)</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-en cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-GB cmp-languagenavigation__item--langcode-en-GB cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-371a810245":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:38:55Z","dc:title":"English (UK)","xdm:linkURL":"/en-gb/","xdm:language":"en-GB"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/gb/en-gb.html" data-item-url="/content/crowdstrike-www/locale-sites/gb/en-gb.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="en-GB" lang="en-GB" rel="alternate" href="/en-gb/">English (UK)</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-US cmp-languagenavigation__item--langcode-en-US cmp-languagenavigation__item--level-0 cmp-languagenavigation__item--active"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-US cmp-languagenavigation__item--langcode-en-US cmp-languagenavigation__item--level-1 cmp-languagenavigation__item--active" data-cmp-data-layer="{"nav-languagenavigation-item-341eefee7f":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-09-25T15:19:07Z","dc:title":"English (US)","xdm:linkURL":"/en-us/cybersecurity-101/","xdm:language":"en-US"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101.html" data-item-url="/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="en-US" lang="en-US" rel="alternate" href="/en-us/cybersecurity-101/">English (US)</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-es cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-ES cmp-languagenavigation__item--langcode-es-ES cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-2efe72a868":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:39:03Z","dc:title":"Español (España)","xdm:linkURL":"/es-es/","xdm:language":"es-ES"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/es/es-es.html" data-item-url="/content/crowdstrike-www/locale-sites/es/es-es.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="es-ES" lang="es-ES" rel="alternate" href="/es-es/">Español (España)</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-en cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-LA cmp-languagenavigation__item--langcode-es-LA cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-d0b2feea13":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:40:03Z","dc:title":"Español (Latinoamérica)","xdm:linkURL":"/es-latam/","xdm:language":"es-LA"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/latam/es-la.html" data-item-url="/content/crowdstrike-www/locale-sites/latam/es-la.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="es-LA" lang="es-LA" rel="alternate" href="/es-latam/">Español (Latinoamérica)</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-fr cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-FR cmp-languagenavigation__item--langcode-fr-FR cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-c9da603a38":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-10-04T08:07:46Z","dc:title":"Français","xdm:linkURL":"/fr-fr/cybersecurity-101/","xdm:language":"fr-FR"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/fr/fr-fr/cybersecurity-101.html" data-item-url="/content/crowdstrike-www/locale-sites/fr/fr-fr/cybersecurity-101.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="fr-FR" lang="fr-FR" rel="alternate" href="/fr-fr/cybersecurity-101/">Français</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-it cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-IT cmp-languagenavigation__item--langcode-it-IT cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-a7d91c58f5":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:39:44Z","dc:title":"Italiano","xdm:linkURL":"/it-it/","xdm:language":"it-IT"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/it/it-it.html" data-item-url="/content/crowdstrike-www/locale-sites/it/it-it.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="it-IT" lang="it-IT" rel="alternate" href="/it-it/">Italiano</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-br cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-BR cmp-languagenavigation__item--langcode-pt-BR cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-a96b878de5":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:39:50Z","dc:title":"Português (Brasil)","xdm:linkURL":"/pt-br/","xdm:language":"pt-BR"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/br/pt-br.html" data-item-url="/content/crowdstrike-www/locale-sites/br/pt-br.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="pt-BR" lang="pt-BR" rel="alternate" href="/pt-br/">Português (Brasil)</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-sa cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-SA cmp-languagenavigation__item--langcode-ar-SA cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-f2c660c77b":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:40:49Z","dc:title":"عربى","xdm:linkURL":"/ar-sa/","xdm:language":"ar-SA"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/sa/ar-sa.html" data-item-url="/content/crowdstrike-www/locale-sites/sa/ar-sa.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="ar-SA" lang="ar-SA" rel="alternate" href="/ar-sa/">عربى</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-en cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-JP cmp-languagenavigation__item--langcode-ja-JP cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-28422b9339":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-10-04T08:08:59Z","dc:title":"日本語","xdm:linkURL":"/ja-jp/cybersecurity-101/","xdm:language":"ja-JP"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/jp/ja-jp/cybersecurity-101.html" data-item-url="/content/crowdstrike-www/locale-sites/jp/ja-jp/cybersecurity-101.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="ja-JP" lang="ja-JP" rel="alternate" href="/ja-jp/cybersecurity-101/">日本語</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-zh cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-TW cmp-languagenavigation__item--langcode-zh-TW cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-a0e769bc95":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:40:16Z","dc:title":"繁體中文","xdm:linkURL":"/zh-tw/","xdm:language":"zh-TW"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/zh/zh-tw.html" data-item-url="/content/crowdstrike-www/locale-sites/zh/zh-tw.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="zh-TW" lang="zh-TW" rel="alternate" href="/zh-tw/">繁體中文</a> </li> </ul> </div> </li> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--langcode-kr cmp-languagenavigation__item--level-0"> <div class="cmp-languagenavigation__listWrapper"> <ul class="cmp-languagenavigation__group"> <li class="cmp-languagenavigation__item cmp-languagenavigation__item--countrycode-KR cmp-languagenavigation__item--langcode-ko-KR cmp-languagenavigation__item--level-1" data-cmp-data-layer="{"nav-languagenavigation-item-db312f935c":{"@type":"crowdstrike/components/content/languagenavigation/v1/languagenavigation/item","repo:modifyDate":"2024-03-22T10:40:42Z","dc:title":"한국어","xdm:linkURL":"/ko-kr/","xdm:language":"ko-KR"}}"> <a data-link-url="/content/crowdstrike-www/locale-sites/kr/ko-kr.html" data-item-url="/content/crowdstrike-www/locale-sites/kr/ko-kr.html" data-cmp-clickable class="cmp-languagenavigation__item-link" hreflang="ko-KR" lang="ko-KR" rel="alternate" href="/ko-kr/">한국어</a> </li> </ul> </div> </li> </ul> </div> </nav> </div> <div class="list list--redesign-secondary-footer"> <ul data-cmp-is="linked-list" class="cmp-list" id="nav-list-footer-misc"> <li class="cmp-list__item"> <article> <span class="cmp-list__item-text ">Copyright © 2025</span> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/legal/privacy-notice/"> <span class="cmp-list__item-link__text"> Privacy</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/legal/cookie-notice/"> <span class="cmp-list__item-link__text"> Cookies</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link external" href="https://privacyportal.onetrust.com/ui/#/preferences/multipage/login/e5019602-7124-4242-8f7c-d1571d0c467d%20" target="_blank" rel="noopener noreferrer"> <img class="cmp-list__item-link__icon" src="https://assets.crowdstrike.com/is/content/crowdstrikeinc/privacyoptions-icon-footer" alt="Your Privacy Choices"/> <span class="cmp-list__item-link__text"> Your Privacy Choices</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link " href="/en-us/legal/website-terms-of-use/"> <span class="cmp-list__item-link__text"> Terms of Use</span> </a> </article> </li> <li class="cmp-list__item"> <article> <a class="cmp-list__item-link cs-uw-accessibilityWidget" href="#"> <span class="cmp-list__item-link__text"> Accessibility</span> </a> </article> </li> </ul> <div style="display: none;"> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-animation.lc-012003c5a08ba65bfd2d6d6b777b7f4e-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-common.lc-0af6250c11fd9e6c1598e3b9a0665911-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-header.lc-3df826add36a3eb06741bc41e93e729b-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-addsearch.lc-b8f6141a81735ad2112829f5c5025005-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-dotcom.lc-ff729977760d22168f26286d3ed4de3e-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-wp.lc-a43cfbce1debf46e5be0c52ac85f3a4f-lc.min.js"></script> <script src="/etc.clientlibs/core/wcm/components/commons/site/clientlibs/container.lc-0a6aff292f5cc42142779cde92054524-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-base.lc-98b44ec74775c5bc76b0744df1c9b66c-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-lottie.lc-59169d2e9977544fd3ae80d885311bce-lc.min.js"></script> <div class="cloudservice includedatalayer"> <script> if(!window.digitalData || Object.keys(window.digitalData).length === 0 ) { window.digitalData = { "component" : [ { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-utility", "text" : "Experienced a breach?", "url" : "/content/crowdstrike-www/language-masters/global/en/services/experienced-a-breach.html" }, { "externalLink" : "\"false\"", "id" : "nav-utility", "text" : "Blog", "url" : "/content/crowdstrike-www/language-masters/global/en/blog.html" }, { "externalLink" : "\"false\"", "id" : "nav-utility", "text" : "Contact us", "url" : "/content/crowdstrike-www/language-masters/global/en/contact-us.html" }, { "externalLink" : "\"false\"", "id" : "nav-utility", "text" : "1-888-512-8906", "url" : "tel:18885128906" } ], "componentInfo" : { } }, { "componentInfo" : { }, "id" : "nav-logo", "fileReference" : "/content/dam/crowdstrike/marketing/en-us/images/graphics-and-illustrations/marketplace/black-primary-crowdstrike-logo-1-addedPadding-3.svg", "thumbnailImagePath" : "/content/dam/crowdstrike/marketing/en-us/images/graphics-and-illustrations/marketplace/black-primary-crowdstrike-logo-1-addedPadding-3.svg/jcr:content/renditions/cq5dam.thumbnail.319.319.png", "url" : "/content/crowdstrike-www/language-masters/global/en.html" }, { "componentInfo" : { }, "id" : "nav-logo-mobile", "fileReference" : "/content/dam/crowdstrike/marketing/en-us/images/graphics-and-illustrations/marketplace/CS_Logo_Falcon.svg", "thumbnailImagePath" : "/content/dam/crowdstrike/marketing/en-us/images/graphics-and-illustrations/marketplace/CS_Logo_Falcon.svg/jcr:content/renditions/cq5dam.thumbnail.319.319.png", "url" : "https://crowdstrike.com" }, { "children" : [ { "id" : "nav-mega-menu-calendar", "text" : "Fal.Con Gov 2025", "url" : "https://www.crowdstrike.com/events/fal-con-gov/" }, { "id" : "nav-mega-menu-calendar", "text" : "CrowdTour 2025", "url" : "https://www.crowdstrike.com/events/crowdtour/" }, { "id" : "nav-mega-menu-calendar", "text" : "Fal.Con 2025", "url" : "https://www.crowdstrike.com/events/fal-con/" }, { "externalLink" : "false", "id" : "nav-mega-menu-calendar", "text" : "View all events", "url" : "https://crowdstrike.com/events/" } ], "componentInfo" : { }, "id" : "nav-mega-menu-calendar" }, { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-login-header", "text" : "Login", "url" : "https://www.crowdstrike.com/en-us/login/" } ], "componentInfo" : { } }, { "componentInfo" : { }, "id" : "nav-cta-desktop", "text" : "Start free trial", "url" : "https://www.crowdstrike.com/products/trials/try-falcon-prevent/" }, { "listingPageType" : "banner", "relatedContentLabel" : "CYBERSECURITY 101:<br />\r\nTHE FUNDAMENTALS OF CYBERSECURITY", "description" : "<p>Cybersecurity is becoming increasingly important in today’s world. CrowdStrike is providing explanations, examples and best practices on fundamental principles of a variety of cybersecurity topics. If you're looking for information on endpoint protection, cloud security, types of cyber attacks and more, you’ve come to the right place – welcome to Cybersecurity 101!</p>", "componentInfo" : { }, "id" : "banner-en-us-12-18-2024", "variation" : "landingPageBanner" }, { "children" : [ { "externalLink" : "false", "id" : "nav-teaser-footer-trial", "text" : "Start free trial", "url" : "https://www.crowdstrike.com/en-us/products/trials/try-falcon-prevent/?ft-trial" }, { "externalLink" : "false", "id" : "nav-teaser-footer-trial", "text" : "Contact us", "url" : "https://www.crowdstrike.com/en-us/contact-us" }, { "externalLink" : "false", "id" : "nav-teaser-footer-trial", "text" : "View pricing", "url" : "https://www.crowdstrike.com/en-us/products" } ], "componentInfo" : { }, "id" : "nav-teaser-footer-trial" }, { "componentInfo" : { }, "id" : "nav-footer-logo", "fileReference" : "/content/dam/crowdstrike/marketing/en-us/images/graphics-and-illustrations/marketplace/black-primary-crowdstrike-logo-1-addedPadding-3.svg", "thumbnailImagePath" : "/content/dam/crowdstrike/marketing/en-us/images/graphics-and-illustrations/marketplace/black-primary-crowdstrike-logo-1-addedPadding-3.svg/jcr:content/renditions/cq5dam.thumbnail.319.319.png", "url" : "/content/crowdstrike-www/locale-sites/us/en-us.html" }, { "facebookUrl" : "https://www.facebook.com/CrowdStrike/", "linkedInUrl" : "https://www.linkedin.com/company/crowdstrike", "youtubeUrl" : "http://www.youtube.com/user/CrowdStrike", "twitterUrl" : "https://twitter.com/CrowdStrike", "componentInfo" : { }, "instagramUrl" : "https://www.instagram.com/crowdstrike/?hl=en" }, { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "Pricing", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/products.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "Free Trial Guide", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/free-trial-guide.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "Falcon Flex", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/products/bundles/falcon-flex.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "Financing", "url" : "https://www.crowdstrike.com/crowdstrike-financial-services/" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "CrowdStrike Marketplace", "url" : "https://marketplace.crowdstrike.com/" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "Small Business", "url" : "https://www.crowdstrike.com/en-us/solutions/small-business/" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "Federal Government", "url" : "https://www.crowdstrike.com/en-us/solutions/federal-government/" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-get-started", "text" : "State & Local Government", "url" : "https://www.crowdstrike.com/en-us/solutions/state-local-government/" } ], "componentInfo" : { } }, { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "About Us", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/about-us.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "Executive Leadership", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/about-us/executive-team.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "Board of Directors", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/about-us/board-of-directors.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "Newsroom", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/news.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "Investor Relations", "url" : "https://ir.crowdstrike.com/" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "CrowdStrike Racing & F1", "url" : "https://crowdstrikeracing.com/" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "Environmental, Social & Governance", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/about-us/environmental-social-governance.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-company", "text" : "Careers", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/careers.html" } ], "componentInfo" : { } }, { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-list-footer-partners", "text" : "Partner Programs", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/partners/partner-program.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-partners", "text" : "Service Providers", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/partners/service-providers.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-partners", "text" : "Strategic Technology", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/partners/strategic-tech-partners.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-partners", "text" : "Channel & Distributors", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/partners/channel-partners.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-partners", "text" : "Become a Partner", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/partners/become-a-partner.html" } ], "componentInfo" : { } }, { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-list-footer-customers", "text" : "Support Portal", "url" : "https://supportportal.crowdstrike.com/" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-customers", "text" : "Developer Portal", "url" : "https://developer.crowdstrike.com/" } ], "componentInfo" : { } }, { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-list-footer-support", "text" : "Call 1-888-512-8906 (US)", "url" : "tel:18885128906" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-support", "text" : "Experienced a Breach?", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/services/experienced-a-breach.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-support", "text" : "Contact Us", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/contact-us.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-support", "text" : "Schedule a Meeting", "url" : "https://hello.crowdstrike.com/calendar/team/t/91" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-support", "text" : "FAQs", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/products/faq.html" } ], "componentInfo" : { } }, { "facebookUrl" : "https://www.facebook.com/CrowdStrike/", "linkedInUrl" : "https://www.linkedin.com/company/crowdstrike", "youtubeUrl" : "http://www.youtube.com/user/CrowdStrike", "twitterUrl" : "https://twitter.com/CrowdStrike", "componentInfo" : { }, "instagramUrl" : "https://www.instagram.com/crowdstrike/?hl=en" }, { "children" : [ { "externalLink" : "\"false\"", "id" : "nav-list-footer-misc", "text" : "Copyright © 2025" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-misc", "text" : "Privacy", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/legal/privacy-notice.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-misc", "text" : "Cookies", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/legal/cookie-notice.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-misc", "text" : "Your Privacy Choices", "url" : "https://privacyportal.onetrust.com/ui/#/preferences/multipage/login/e5019602-7124-4242-8f7c-d1571d0c467d%20" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-misc", "text" : "Terms of Use", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/legal/website-terms-of-use.html" }, { "externalLink" : "\"false\"", "id" : "nav-list-footer-misc", "text" : "Accessibility", "url" : "#" } ], "componentInfo" : { } } ], "version " : "1.0", "page" : { "pageInfo" : { "pageType" : "cybersecurity-101 parent", "publisher" : "crowdstrike.com", "language" : "en_US", "destinationURL" : "https://www.crowdstrike.com/en-us/cybersecurity-101/", "sysEnv" : "prod", "issueDate" : "2024-09-25T15:19:07Z00", "pageID" : "/content/crowdstrike-www/locale-sites/us/en-us/cybersecurity-101", "pageName" : "Cybersecurity 101: The Fundamentals of Cybersecurity", "breadcrumbs" : [ "CrowdStrike.com", "Locale Sites", "United States", "CrowdStrike: Definitive AI-native cybersecurity platform", "Cybersecurity 101: The Fundamentals of Cybersecurity" ], "effectiveDate" : "2024-09-25T15:19:07Z00" }, "attributes" : { "template" : "crowdstrike-wp-content-page", "tags" : [ ] }, "category" : { "primaryCategory" : "cybersecurity-101 parent" } }, "event" : [ { "eventName" : "Page Load", "eventAction" : "pageLoad" } ] } } </script> </div> </body> </html>