Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The SIEM vs. XDR debate: industry perspectives

How many times can we say, “It’s been a busy week for the security industry,” before it becomes cliche? We recently discussed changes in the SIEM market, with mergers and acquisitions disrupting the traditional SIEM vendor landscape and XDR vendors introducing new SIEM solutions. This week, we continue to see a range of mixed messages from the market around the future of XDR and SIEM.

5 Types of Clone Phishing Attacks and Best Protection Strategies

Imagine: You get an email from your bank alerting you to a suspicious login attempt. It looks identical to their usual security notices, down to the logo and phrasing. You click the link to review the activity, log into your account—and unwittingly hand your credentials over to a cybercriminal. This is the reality of clone phishing.

The Most Common Ways Cyber Criminals Will Target Your Business

Businesses face an ever-growing array of security threats from cybercriminals. Scammers and hackers employ increasingly sophisticated techniques to infiltrate corporate networks, steal sensitive information, and disrupt operations. In 2023, consumers and businesses in the United States reported losing more than $10 billion to fraud and online scams, marking the first time that fraud losses have reached that benchmark. This is a 14% increase over reported losses in 2022.

Understanding The Cyber Resilience Act (CRA)

The 2020 EU Cybersecurity Strategy, published by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy, aimed to establish safeguards against security risks arising from increased digital connectivity. As part of the strategy, the strategy included updates to Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union (NIS2).

Cybersecurity and Doughnuts: A Sweet Approach to Office Security

In the realm of office dynamics and cybersecurity, sometimes the simplest strategies are the most effective. One such strategy that has gained popularity here amongst our ranks is the penalty of buying doughnuts for the office whenever someone forgets to lock their computer when stepping away. This sweet approach not only keeps cybersecurity at the forefront of everyone’s mind but also fosters a sense of camaraderie and accountability.

CrowdStrike Wins Frost & Sullivan 2024 Cloud Leadership Award

Frost & Sullivan named CrowdStrike the winner of its 2024 Customer Value Leadership Award in the global cloud security industry, reinforcing our dominance in cloud security at a time when the practice has never been more critical for organizations worldwide. According to the CrowdStrike 2024 Global Threat Report, cloud intrusions grew 75% year-over-year in 2023, with adversaries becoming more focused and persistent in the cloud.

EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis

CrowdStrike is constantly researching, working and innovating to stay at the cutting edge of threat detection and response. Recently, these efforts include EMBERSim, a large-scale dataset developed to address limitations in binary code similarity (BCS), improve malware detection and facilitate future work in this area.

Vendor Disruption May Have You Rethinking Your App Delivery Investments

ADC vendor landscape is experiencing a significant change as a result of acquisitions and shifting portfolio priorities among the two largest ADC vendors. That is bringing about uncertainty with customers who have relied on these vendors for their mission-critical application infrastructures. Businesses are built on applications, and for digital-first businesses, they are critical for driving revenue and delivering a positive customer experience.