Security Ledger Editor in Chief Paul Roberts sits down to talk with Dmitri Alperovitch, the co-founder and Chief Technology Officer at the firm CrowdStrike. An expert in advanced persistent threat style attacks – many of them launched by nation backed hackers – Dmitri talks about the significance of Russia’s hacking of the 2016 presidential election in the U.S. and how the U.S. government may respond to future cyber threats.
Search Results for "CrowdStrike"
Don’t Call It A Hack Back: Crowdstrike Unveils Falcon Platform
Lots of aspiring technology start-ups dream of getting their product written up in The New York Times or Wall Street Journal when it launches. For Crowdstrike Inc. a two year-old security start-up based in Laguna Niguel, California, media attention from the papers of record hasn’t been an issue. This reporter counted twelve articles mentioning the company in The Times in the last year, and another two reports in The Journal. Much of that ink has been spilled on stories related to Crowdstrike research on sophisticated attacks, or the company’s all-star executive team, including former McAfee executives George Kurtz (CEO) and Dmitri Alperovitch (CTO), as well as former FBI cybersecurity chief Shawn Henry (Crowdstrike’s head of services), who left the Bureau in April, 2012 to join the company. For much of that time, Crowdstrike has been known mostly as a security services and intelligence firm, but the goal was always to […]
SpyCloud Research Shows that Endpoint Detection and Antivirus Solutions Miss Two-Thirds (66%) of Malware Infections
Austin, TX, USA, 7th April 2025, CyberNewsWire
Security Validation: A Deep Dive with Cymulate’s David Kellerman
In this Spotlight episode, host Paul Roberts speaks with David Kellerman, the Field CTO at Cymulate, about the growing demand for security validation technology, like Cymulate’s, as organizations struggle to assess the utility and effectiveness of their security investments.
China Calls Out U.S. For Hacking. The Proof? TBD!
The Chinese government is taking an aggressive approach to countering stories of Chinese cyber offensive campaigns: promoting tales of US hacks on Chinese organizations, but without the data to back them up.