Articles by George
Activity
-
At #ProofpointProtect New York, we set a new standard in #HumanCentricSecurity. In London, we’re reinforcing our commitment to our EMEA customers…
At #ProofpointProtect New York, we set a new standard in #HumanCentricSecurity. In London, we’re reinforcing our commitment to our EMEA customers…
Liked by George Kurtz
-
Today’s keynote session at #ProofpointProtect EMEA featured a candid discussion between George Kurtz, CEO of CrowdStrike and Sumit Dhawan, CEO of…
Today’s keynote session at #ProofpointProtect EMEA featured a candid discussion between George Kurtz, CEO of CrowdStrike and Sumit Dhawan, CEO of…
Liked by George Kurtz
-
A big thanks to all our amazing customers and CrowdStrikers for making this possible. 🙏
A big thanks to all our amazing customers and CrowdStrikers for making this possible. 🙏
Shared by George Kurtz
Publications
-
Hacking Exposed - Network Secrets and Solutions -6th Edition
McGraw-Hill
The number one security book ever published in over 30 different languages.
Patents
-
Kernel-level security agent
Issued US 9,043,903
The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the…
The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The kernel-level security agent may also deceive an adversary associated with malicious code. Further, the kernel-level security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.
-
System and method for network vulnerability detection and reporting.
US 7,152,105 and 7,543,056
Other patents pending.
Honors & Awards
-
Ernst & Young Entrepreneur of the Year Northern California
Ernst & Young
This award is given to entrepreneurs who are excelling in areas such as innovation, financial performance and personal commitment to their businesses and communities. However, it goes beyond other, similar awards because in making their selections, the EY’s independent panel of judges also considers attributes such as vision and leadership — celebrating those who take risks to achieve success and give back to their…
This award is given to entrepreneurs who are excelling in areas such as innovation, financial performance and personal commitment to their businesses and communities. However, it goes beyond other, similar awards because in making their selections, the EY’s independent panel of judges also considers attributes such as vision and leadership — celebrating those who take risks to achieve success and give back to their communities.
https://www.crowdstrike.com/blog/crowdstrike-ceo-and-co-founder-george-kurtz-wins-ernst-young-entrepreneur-of-the-year-for-security/ -
Time Magazine: Innovators in Science and Technology Who Will Help Shape The World
Time Magazine
Featured in Time Magazine as a leader in Cyber Security.
-
100 Most Intriguing Entrepreneurs by Goldman Sachs
Goldman Sachs
This award recognizes entrepreneurs focused on building great and enduring companies that reshape their industries and make the world better through innovation.
-
Top 100 Voices in Security for 2011
-
Top 100 Voices in Security:
http://security.sys-con.com/node/1974029
Recommendations received
24 people have recommended George
Join now to viewMore activity by George
-
The incident of July 19th looked like the end of CrowdStrike and Microsoft’s cordial relationship. Thankfully, better leadership prevailed and any…
The incident of July 19th looked like the end of CrowdStrike and Microsoft’s cordial relationship. Thankfully, better leadership prevailed and any…
Liked by George Kurtz
-
Just got back from an awesome time at Fal.Con in Vegas. The new Falcon for IT is set to revolutionize IT ops and cybersecurity. Met George Kurtz CEO…
Just got back from an awesome time at Fal.Con in Vegas. The new Falcon for IT is set to revolutionize IT ops and cybersecurity. Met George Kurtz CEO…
Liked by George Kurtz
-
Growth is painful. Change is painful. But nothing is as painful as staying stuck somewhere you don't belong. We often feel stuck—in school, college,…
Growth is painful. Change is painful. But nothing is as painful as staying stuck somewhere you don't belong. We often feel stuck—in school, college,…
Liked by George Kurtz
-
I want to take a moment to personally thank James Small, Michael Sentonas, George Kurtz, and the entire CrowdStrike team. The channel file outage was…
I want to take a moment to personally thank James Small, Michael Sentonas, George Kurtz, and the entire CrowdStrike team. The channel file outage was…
Liked by George Kurtz
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named George Kurtz in United States
-
George Kurtz
Financial Adviser at McDermott Investment Advisors, LLC
-
George Kurtz
-
George Kurtz
Architectural Engineering Undergraduate at University of Colorado Boulder
-
George Kurtz
Analyst at SportsGrid
32 others named George Kurtz in United States are on LinkedIn
See others named George Kurtz