Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike's Journey in Customizing NVIDIA Nemotron Models for Peak Accuracy and Performance

Today’s security teams need AI models that can reason over massive telemetry and support autonomous actions. At CrowdStrike, we're working closely with NVIDIA to operationalize NVIDIA Nemotron open models1, building on our existing integration of Nemotron on Amazon Bedrock within the CrowdStrike Falcon platform. This collaboration enables us to rigorously test and adapt large language models (LLMs) for security-specific workloads while maintaining production-grade performance and security.

How the Model Context Protocol Is Redefining Zero Trust for AI Agents

As Artificial Intelligence (AI) agents become more autonomous by accessing critical systems and acting without real-time human oversight, they are evolving from productivity tools into active Non-Human Identities (NHIs) like service accounts or API keys that require the same oversight and controls as human users. This shift expands organizational attack surfaces, introducing new security risks related to overprivileged access and lateral movement of NHIs across cloud infrastructure.

Unlocking AI Data Security: Strategic Solutions

AI systems are no longer experimental. They sit at the center of product experiences, internal workflows, and customer-facing automation. As soon as an AI feature ships, it starts handling real data. Customer messages. Internal documents. Support tickets. Logs. Training samples. That’s when AI data security stops being an abstract concern and becomes a product requirement.

Agentless IoT Security: How to Secure Devices You Can't Touch in 2026

As IoT and operational technology environments expand, organisations are discovering that a large portion of their device estate simply cannot be secured using traditional methods. Many devices cannot run agents, cannot be patched regularly, or cannot tolerate downtime. In 2025, this reality is no longer the exception—it is the norm.

How Engineering and Security Teams Can Meet DORA's Technical Requirements

Every financial entity operating in the European Union must comply with the Digital Operational Resilience Act (DORA). DORA focuses on whether systems can withstand, respond to, and recover from ICT-related disruptions and whether this can be demonstrated with evidence. For engineering, security, and risk teams, this introduces a practical requirement. Operational resilience must be observable in live systems, continuously tested, and traceable over time.

Delivering Microsoft 365 Management Security and Protection Profitably

Summary Microsoft 365 is mission-critical for SMBs, but managing it with fragmented backup and security tools creates complexity, security gaps, and shrinking margins for MSPs. Disconnected solutions increase manual work, operational overhead, and risk across email, data, identity, and compliance. A unified Microsoft 365 protection approach consolidates backup, XDR, email security, archiving, security awareness training, and posture management into a single multi-tenant platform.

The ROI of Modern DLP Solutions: Why It's Worth the Investment

Every security leader is tasked with a difficult balancing act: reducing risk while controlling cost. Cybersecurity budgets aren’t unlimited, and executive teams demand clear justification for every new tool. Data loss prevention (DLP) has often struggled to prove its value in this context. Traditional solutions were expensive to deploy, noisy in practice, and often delivered more frustration than measurable protection.

Zero Trust Implementation: Why it Matters and How to Implement

Zero Trust is a security mindset and architecture that assumes no user, device, or network is inherently trustworthy, requiring continuous verification for every access request. Unlike a single tool or product, it requires a holistic strategy that integrates strong identity controls, such as MFA and least privilege access. Success with Zero Trust hinges on cultural shifts, executive buy-in, and ongoing adaptation to threats that emerge beyond the initial setup.

Dominate IoT data privacy: Strong safeguards for connected devices in 2026

Everywhere you look, your wrist, your home, your car, smart devices quietly gather data. The Internet of Things (IoT) has evolved from a novelty into the backbone of daily life. From smart thermostats that learn your schedule to industrial sensors tracking performance in real time, connected devices are reshaping how we live, work, and interact. But with that progress comes peril. Each device represents a potential breach point; every upload, update, or firmware oversight can expose personal information.

The new unit economics playbook for ecommerce operators

EcomWatch is a digital publication launched by experienced ecommerce entrepreneurs who believed the industry needed a news outlet built by people who actively run online stores. Its mission is to deliver timely, evidence based insights across the ecommerce ecosystem. What follows reflects that operator lens: the hard levers that improve contribution margin and cash flow in a market where customer acquisition is pricier, fulfillment is more complex, and signal quality is noisier.