Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike

CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security

I’m thrilled to announce CrowdStrike’s agreement to acquire Flow Security, a pioneer in data security posture management (DSPM) and the industry’s first and only cloud data runtime security solution. With this acquisition, CrowdStrike is setting the standard for modern cloud security with complete real-time data protection spanning endpoint and cloud environments, delivering the only cloud data protection platform that secures data both at rest and in motion.

The Anatomy of an ALPHA SPIDER Ransomware Attack

Over the last two years, CrowdStrike Services has run several incident response (IR) engagements — in both pre- and post-ransomware situations — in which different ALPHA SPIDER affiliates demonstrated novel offensive techniques coupled with more commonly observed techniques. The events described in this blog have been attributed to ALPHA SPIDER affiliates by CrowdStrike Counter Adversary Operations.

CrowdStrike and Intel Research Collaborate to Advance Endpoint Security Through AI and NPU Acceleration

At CrowdStrike, we are relentlessly researching and developing new technologies to outpace new and sophisticated threats, track adversaries’ behavior and stop breaches. As today’s adversaries continue to become faster and more advanced, the speed of enterprise detection and response is paramount. It is also a challenge for today’s organizations, which face mounting attack volumes amid a global shortage of cybersecurity practitioners.

CrowdStrike Customers Share Benefits of Cybersecurity Consolidation and Technology Integrations

I recently had the opportunity to speak with three CrowdStrike customers who shared their stories on why they consolidated on the CrowdStrike Falcon® XDR platform and the benefits of CrowdStrike’s tech integrations with partners like Okta and Zscaler. The 30-minute virtual panel, “Customer Best Practices for Security Consolidation Success,” is brimming with helpful information for security professionals. Why is this topic top-of-mind for so many?

Still Alive: Updates for Well-Known Latin America eCrime Malware Identified in 2023

Latin America (LATAM) is a growing market, and threat actors have used numerous eCrime malware variants to target users in this region. Over the past few years, many researchers have characterized the tactics, techniques and procedures (TTPs) of widespread Latin America malware families, including but not limited to Mispadu, Grandoreiro, Mekotio, Casbaneiro, Metamorfo and Astaroth.

Conversations with Charlotte AI: Vulnerabilities on Internet-Facing Hosts

With Charlotte AI, the information security analysts need to stop breaches is simply a question away. Watch how analysts are turning hours of work into minutes and seconds — getting the context they need to identify vulnerabilities on internet-facing hosts.

CrowdStrike 2024 Global Threat Report: Adversaries Gain Speed and Stealth

The CrowdStrike Global Threat Report, now in its tenth iteration, examines how adversaries’ behavior poses an ever-expanding risk to the security of organizations’ data and infrastructure. Armed with this critical information, organizations are better equipped to face evolving threats. Stealth was the pervading theme of the 2023 threat landscape.

CrowdStrike Named the Only Customers' Choice: 2024 Gartner "Voice of the Customer" for Vulnerability Assessment

It is a common refrain in security circles that “nobody loves their vulnerability management tool.” CrowdStrike may have just proved to be the exception. We are proud to announce that CrowdStrike is the only vendor named a Customers’ Choice in the 2024 Gartner “Voice of the Customer” Report for Vulnerability Assessment. In this report, CrowdStrike is the only vendor placed in the upper right quadrant, meaning we received a Customers’ Choice Distinction.

Falcon Exposure Management Asset Criticality Rules: Demo Drill Down

Undifferentiated protection of assets can lead to misallocated resources and vulnerable critical systems. Falcon Exposure Management's Asset Criticality Rules feature allows for precise prioritization of your most essential assets, ensuring they receive the focused protection they deserve. This demo will showcase how effectively implemented criticality rules bring clarity and strategic security to safeguard your key assets where it matters most.