Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Innovates to Modernize National Security and Protect Critical Systems

At Fal.Con Gov 2026, CrowdStrike is introducing new innovations to accelerate modernization and strengthen cyber defense of government systems, while helping agencies meet some of the most rigorous compliance standards within a FedRAMP-authorized environment. Cybersecurity is national security. Ransomware threatens public safety and continuity of operations. Supply chain compromise multiplies impact. Nation-state actors target critical infrastructure for strategic disruption.

Falcon Platform for Government Now Offers Falcon for XIoT to Secure Connected Assets

CrowdStrike Falcon Platform for Government, our FedRAMP High authorized offering, has expanded to include CrowdStrike Falcon for XIoT. This addition delivers native XIoT visibility and protection through the CrowdStrike Falcon platform so government agencies can protect connected assets and critical infrastructure.

4 Ways Businesses Use CrowdStrike Charlotte AI to Transform Security Operations

Security teams are being asked to do more than ever, often with fewer people and less time. As alert volumes continue to rise and adversaries automate their attacks, even mature SOCs struggle to keep pace. Legacy tools surface signals, but they still leave analysts responsible for triage, investigation, and response decisions that take time and experience to execute well. CrowdStrike Charlotte AI was built to change that model.

Enhanced Network Visibility: A Dive into the Falcon macOS Sensor's New Capabilities

The much-anticipated Enhanced Network Visibility feature for macOS is now generally available in sensor version 7.29 or later. This new capability provides insight and improved visibility into network traffic occurring on macOS endpoints, creating a more sophisticated and comprehensive model of process behavior. In this blog, we provide an in-depth overview of this new capability.

Falcon for XIoT Extends Asset Protection to Healthcare Environments

CrowdStrike Falcon for XIoT is extending its industry-leading protections to medical devices in healthcare environments. This will provide comprehensive security for patient care at a time when healthcare organizations are a key target for threat actors. As of January 2026, the HHS listed over 750 reported breaches within healthcare environments that were under investigation.

Falcon Next-Gen SIEM Simplifies Onboarding with Sensor-Native Log Collection

As organizations expand their SIEM footprint, data onboarding often becomes a bottleneck. Deploying log collectors at scale typically requires coordination across multiple teams, external software distribution systems, packaging workflows, and change-control approvals. All of this impedes visibility when speed is critical. Adversaries are breaking out to move laterally across environments in as little as 27 seconds, according to the CrowdStrike 2026 Global Threat Report.

CrowdStrike Achieves NCSC CIR Assurance for Incident Response

CrowdStrike has been independently assessed and assured against the National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Standard, a UK government-backed standard designed to help organizations identify incident response providers with the capability, governance, and technical competence to manage serious cyber incidents.

CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security

FalconID is now generally available, bringing phishing-resistant MFA to the CrowdStrike Falcon platform and advancing CrowdStrike’s leadership in identity security. Adversaries continue to use legitimate identities to infiltrate and navigate organizations while evading defenses. As they adopt AI, the scale and impact of social engineering and credential abuse are growing. AI-enhanced phishing, MFA fatigue, and session hijacking enable threat actors to bypass MFA.

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

As cyber defenses become stronger, adversaries continue to evolve their tactics to succeed. In 2025, the year of the evasive adversary, the threat landscape was defined by attacks that targeted trusted relationships, demonstrated fluency with AI tools, and incorporated tradecraft tailored to exploit security blind spots.

The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

Typosquatting is a deceptive technique in which threat actors register misspelled or look-alike domains of legitimate organizations to trick users into visiting fraudulent sites. It remains one of the most effective and underestimated attack vectors in the modern cyber threat landscape. What appears to be a misspelled domain often conceals sophisticated campaigns designed to phish company employees or customers, harvest credentials, deliver malware, and damage organizational reputation.