Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Spotlight on the Log-Structured Merge (LSM) Tree: One of the Keys Enabling CrowdStrike to Process Trillions of Events per Day

In a previous post, our team shared our Three Best Practices for Building a High-Performance Graph Database. That was written two years ago, when CrowdStrike Threat Graph® was processing billions of events per day and storing a few petabytes of data. Fast forward to today: CrowdStrike Threat Graph now stores over 40 petabytes of data and handles trillions of events per day while routinely serving upward of 70 million requests per second.

CrowdStrike Announces Expanded Service Integrations at AWS re:Invent 2022

At AWS re:Invent 2022, CrowdStrike is announcing expanded service integrations with AWS to provide breach protection across your AWS environment, simplified infrastructure management and security consolidation. Visit us at Booth 109, Nov. 28-Dec. 2 in Las Vegas, to learn more about our comprehensive integrations with AWS.

UpGuard Creating Risk Waivers in Risk Assessment Demo // Chris Schubert, Senior Product Manager

Hear from UpGuard's Senior Product Manager, Chris Schubert, as he introduces you to UpGuard's new Risk Waiver workflow in Risk Assessments. This quarter, we’ve expanded our risk assessments framework so that you can waive risks within each individual risk assessment. This feature streamlines the risk waiver workflow so you can now create, review and waive risks all within a risk assessment.

UpGuard Shared Profiles and NDA Protection // Harsh Budholiya, Product Marketing Lead

Learn from UpGuard's Product Marketing Lead, Harsh Budholiya, as he introduces you to UpGuard's NDA Protection feature in Shared Profiles. As part of Shared Profiles, you now have the option to add a non disclosure agreement, or NDA, that must be accepted by organizations before access is granted. This gives Shared Profile owners complete visibility and control over their privacy settings with features including access controls and logs to ensure sensitive and private information contained in Shared Profiles remains secure.

Fix common cloud security risks with the Essential Cloud Security Controls Ruleset

With the continual increase of attacks, vulnerabilities, and misconfigurations, today’s security organizations face an uphill battle in securing their cloud environments. These risks often materialize into unaddressed alerts, incidents, and findings in their security products. However, part of the issue is that many security teams are often stretched too thin and overburdened by alert fatigue.

5 Tips for protecting your connected vehicle against Cyberattacks

As more connected vehicles hit the road, cyberattacks are increasing. Deloitte estimates that there will be over 470 million connected cars in use by 2025 if their popularity continues to grow at the current rate. And because each connected car produces about 25 GB of data every hour, they are a tempting challenge for cybercriminals and bad actors with malicious intent.