Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

See Falcon Privileged Access in Action

Adversaries exploit standing privileges to escalate access and move laterally. Watch to see how Falcon Privileged Access—powered by Falcon Identity Protection—enforces just-in-time access, delivering full visibility and real-time revocation to stop identity-based threats before damage is done. CrowdStrike protects across the full identity attack lifecycle to ensure only the right identities have the right access, at the right time.

Take the fear out of phishing response: Lessons from Material Security

For modern security teams, phishing remains one of the most persistent and resource-intensive challenges their organizations face. But automating the detection and response to phishing attacks not only saves time, but also reduces errors and strengthens your organization's overall defense.

Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark’s experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys.

April 22, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Palo Alto Confirms Brute Force Campaign Against PAN-OS Devices Worldwide Following Kroll's previous bulletin highlighting a report from GreyNoise indicating a large uptick in activity targeting Palo Alto devices, it has been confirmed that Palo Alto has detected an ongoing campaign to brute force login credentials to PAN-OS devices.