Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Bridging the Gap Between VMs and Containers

Traditionally, containers and VMs have operated in separate silos, each with distinct management tools and workflows. OpenShift Virtualization breaks down these barriers, allowing VMs to run alongside containerized applications as native Kubernetes resources. This offers organizations the flexibility to modernize their application stacks incrementally, leveraging existing VM-based workloads while embracing the agility of containers.

Seeing is Securing: Why Insider Threats Could Be Your Company's Biggest Blind Spot

You lock the doors to your office. You secure your systems with firewalls and antivirus software. You’ve got two-factor authentication for everything. But here’s the hard truth: the biggest threat to your organization might already be inside the building—or logged into your network. The stats don’t lie. Insider threats have been steadily climbing, with 76% of organizations experiencing attacks in 2024, up from 66% just five years ago . And these aren’t just minor issues.

How to Prevent Sensitive Data Exposure to AI Chatbots Like DeepSeek

With the rise of AI chatbots such as DeepSeek, organizations face a growing challenge: how do you balance innovative technology with robust data protection? While AI promises to boost productivity and streamline workflows, it can also invite new risks. Sensitive data—whether it’s customer payment information or proprietary research—may inadvertently end up in the prompts or outputs of AI models.

Kubernetes Secrets: How to Use Them Securely

Storing sensitive values is a problem as old as software itself. In 2016, Uber experienced a massive data breach that exposed 57 million users’ personal information—all traced back to a hardcoded AWS credential discovered in a GitHub repository. While we have successfully established that hardcoding secrets such as API keys and passwords is bad practice, correctly storing them is a different story, and the issues from 2016 are still prevalent today (8 years later…).

Australia: So Good, Even Data Wants to Stay

If you ask the Organization for Economic Cooperation and Development (OECD) how Australians feel about their country, their response would paint a rosy picture. For example, on average people around the world rate their satisfaction with their country at 6.7 out of 10. Australians rate their satisfaction at 7.1. The average electoral participation among nations is 69%, in Australia it’s 92%.

A Deep Peek at DeepSeek

DeepSeek’s rapid ascent in the AI space has made it impossible to ignore. Its sophisticated models and AI assistant have captured global attention. And, while headlines focus on DeepSeek’s capabilities, STRIKE research exposes critical security flaws, hidden data flows, and unanswered questions about who has access to the data and why.

CrowdStrike University Fast Track Fuels Cybersecurity Training

Organizations today battle an ever-evolving cyber threat landscape, yet many security teams struggle to keep pace due to a critical skills gap and limited access to high-quality training. As teams are expected to do more with fewer resources, cybersecurity education is essential. At CrowdStrike, we’re committed to breaking down these barriers.

Fortifying Data Security: How Protegrity Aligns with NIST Standards

The National Institute of Standards and Technology (NIST) is a U.S. government agency that develops and promotes standards, guidelines, and best practices to enhance information security and privacy. Recognized globally, NIST frameworks set the benchmark for building secure systems and managing cybersecurity risks.