Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

You don't need quantum hardware for post-quantum security

Organizations have finite resources available to combat threats, both by the adversaries of today and those in the not-so-distant future that are armed with quantum computers. In this post, we provide guidance on what to prioritize to best prepare for the future, when quantum computers become powerful enough to break the conventional cryptography that underpins the security of modern computing systems.

Aligning SRE and security for better incident response

In this series, we looked at why we combined our SRE and security teams into one cohesive group, and how we made that happen. With this combined approach, we set out to build our internal platform and customer-facing products with a security-first mindset, while still drawing upon the deep expertise of our existing SRE practices. Combining the teams improved the way we build tools for both our engineers and customers and strengthened our ability to mitigate risks.

Falcon Data Protection Stop GenAI Leaks with Unified Data Protection: Demo Drill Down

Stop GenAI data leaks before they happen. Falcon Data Protection unifies visibility and protection across browsers, local apps, shadow AI services, and cloud flows—closing blind spots across the entire GenAI attack surface. With real-time GenAI-specific detections, unified dashboards, and layered controls, organizations can embrace GenAI securely while protecting sensitive data. Watch the demo to see how CrowdStrike helps you boost productivity without risking exposure.

Falcon Data Protection Accelerate Investigations with the Insider Threat Dashboard: Demo Drill Down

Detect insider threats before sensitive data walks out the door. The Falcon Insider Risk Dashboard unifies identity and data signals into a single view, surfacing risky behavior with out-of-the-box detections and dynamic risk scoring. Analysts gain context-rich visibility to quickly spot malicious insiders, careless mistakes, or stolen identities—enabling faster, more accurate investigations. Watch the demo to see how CrowdStrike stops insider threats early and keeps sensitive data secure.

CrowdStrike Threat Intelligence Browser Extension

Quickly access CrowdStrike's industry-leading threat intelligence directly in your Chrome browser. The CrowdStrike Threat Intelligence Browser Extension scans web pages to identify IOCs, adversaries, malware, and vulnerabilities, providing rich context and analysis without switching between tools.

Best Buy gains visibility and ease by pairing Tanium and Microsoft Security solutions

The integration of Tanium and Microsoft provides retail giant Best Buy with a unified security solution that consolidates data into a single pane of glass for better visibility and control. Resulting in a nearly 20% reduction in MTTR for active events.