Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Falcon Exposure Management - Predictors of Attack

Falcon Exposure Management empowers enterprises with real-time insights to confidently manage risk by creating a near digital twin of your IT and security landscape. Predictors of Attack leverages OverWatch and Intelligence Patterns to analyze potential intrusion vectors, transforming complex data into clear investigation and remediation priorities. Guided Remediation then pre-calculates the most effective solutions, turning priorities into actionable plans—all to stop breaches before they start.

Falcon Next-Gen SIEM - Detection Posture Management & Workflow Automation Enhancements

Crowdstrike's new detection posture management dashboard lets you visualize your detection posture like never before. Once you understand your current posture, the Falcon Platform empowers you to streamline prescriptive countermeasures in your workflows with the latest releases in Falcon Fusion. Our content library contains an ever growing collection of applications, actions, triggers, and playbooks that help you break down silos between teams and technologies. These innovations make it even more efficient for you and your team to respond faster than the adversaries, and ultimately stop the breach.

Best Practices For Securing Your Login Page Attack Surface

When managing an organization’s attack surface, the focus often falls on broad categories like firewalls, endpoints, or software vulnerabilities. Yet, one obvious blind spot is login pages. Login pages are not just entry points for users but potential gateways for attackers. From an EASM point of view, login pages pose important security concerns because of their exposure to the Internet.

Chinese Hackers Target APAC Governments with EAGLEDOOR Malware Exploiting GeoServer Flaw

In a sophisticated cyber espionage campaign, a group of Chinese hackers has exploited a critical vulnerability in GeoServer to target government organizations across the Asia-Pacific (APAC) region. This operation, linked to the advanced persistent threat (APT) group known as Earth Baxia, highlights the evolving landscape of cyber threats facing sensitive sectors, including government and energy.

Accelerating Torq's Vision: Announcing Our Series C Funding Round

I’m excited to share some significant news that marks a pivotal milestone in Torq’s journey. We’ve successfully closed our Series C funding round, securing a $70M investment to propel our mission of revolutionizing SecOps through the Generative AI-based Torq Hyperautomation Platform and cutting-edge Torq HyperSOC solution.

A safer Internet with Cloudflare: free threat intelligence, analytics, and new threat detections

Anyone using the Internet likely touches Cloudflare’s network on a daily basis, either by accessing a site protected by Cloudflare, using our 1.1.1.1 resolver, or connecting via a network using our Cloudflare One products. This puts Cloudflare in a position of great responsibility to make the Internet safer for billions of users worldwide. Today we are providing threat intelligence and more than 10 new security features for free to all of our customers.

Cloudflare partners with Internet Service Providers and network equipment providers to deliver a safer browsing experience to millions of homes

In 2018, Cloudflare announced 1.1.1.1, one of the fastest, privacy-first consumer DNS services. 1.1.1.1 was the first consumer product Cloudflare ever launched, focused on reaching a wider audience. This service was designed to be fast and private, and does not retain information that would identify who is making a request. In 2020, Cloudflare announced 1.1.1.1 for Families, designed to add a layer of protection to our existing 1.1.1.1 public resolver.

Cloudflare helps verify the security of end-to-end encrypted messages by auditing key transparency for WhatsApp

Chances are good that today you’ve sent a message through an end-to-end encrypted (E2EE) messaging app such as WhatsApp, Signal, or iMessage. While we often take the privacy of these conversations for granted, they in fact rely on decades of research, testing, and standardization efforts, the foundation of which is a public-private key exchange.

CCPA Compliance Guide: How to Get Your Business CCPA Compliant

Over the past few years, businesses have been fighting against the threat of data breaches and cyberattacks, and customers are trying to find new ways to protect their privacy online and keep their data safe from being shared with third parties. Since 2018, the California Consumer Privacy Act and others, such as the GDPR, have made it a legal obligation for companies to protect user data. As a result, other states are starting to follow suit.