Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Asia's Evolving AI Regulatory Landscape: Lessons from Cybersecurity Regulation

Artificial intelligence (AI) is transforming industries across Asia, driving innovation, economic growth, and societal advancements. However, AI’s profound impact also brings significant governance challenges. As with any transformative technology, robust regulatory frameworks are essential to mitigate risks, ensure ethical use, and protect public interests. Reflecting on the evolution of cybersecurity regulation may provide insight into how AI regulation might develop.

CrowdStrike Named a Major Player in IDC MarketScape: Worldwide SIEM for Enterprise 2024

CrowdStrike is excited to announce we are named a Major Player in the IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment.1 This marks our first appearance in a SIEM-focused analyst report since bringing CrowdStrike Falcon Next-Gen SIEM to market less than a year ago. We believe this milestone speaks volumes about our commitment to revolutionizing security operations.

CrowdStrike Named a Leader in the 2024 Forrester Wave: Attack Surface Management Solutions

CrowdStrike is proud to be named a Leader in The Forrester Wave: Attack Surface Management Solutions, Q3 2024. Our position as a Leader reinforces our belief that the rapid expansion of modern attack surfaces requires a powerful, unified solution — and CrowdStrike Falcon Exposure Management provides the critical capabilities modern organizations need.

Supporting Victims and Empowering Recovery - CyberAwareness Month 2024

As the digital world continues to grow, so do the threats within it. Cybercrime is no longer just an online inconvenience—it’s a serious issue affecting real lives, families, and communities. In recognition of Cyber Awareness Month this October, The Cyber Helpline is launching a crucial campaign to raise £50,000 to expand and enhance our vital services for victims of online harm.

Understanding and Detecting Lateral Movement

A ransomware attack is underway. The threat actor has gained initial access to an endpoint and executed malicious code on it. As far as the threat actor is concerned, things are going well. However, the next stage is critical to a ransomware attack’s success. Without the ability to spread throughout the entire environment, encrypting or locking up all systems, threat actors are unlikely to be able to extort payment from an organization.

6 Threat Modeling Examples for DevSecOps

As organizations push the boundaries of innovation, the need to embed security into every layer of the development process has never been more pressing. DevSecOps—a practice that integrates security directly into the DevOps pipeline—has emerged as a critical approach to staying ahead of potential threats. Yet, the challenge is knowing how to weave security seamlessly into these complex, fast-moving environments.