Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike

CrowdStrike Uses Proven Detection Logic for Pre-Deployment Malware Scanning

As organizations embrace DevOps practices and CI/CD pipelines to accelerate software delivery, their greater dependency on third-party components can introduce security risks. Because malware can infiltrate an environment during development, it’s important to check for it ahead of deployment.

Assessing Misconfigurations at Scale with Falcon Exposure Management

As most security teams know, vulnerabilities often steal the limelight with sensational headlines and zero-day exploits. However, lurking beneath the surface are misconfigurations — overlooked risks that can leave even well-protected systems exposed. Addressing these configuration errors is essential. Security configuration assessment (SCA), also known as configuration management, is the process of discovering unsafe configuration settings.

CrowdStrike Earns AAA Award, 100% Total Accuracy Score in SE Labs Q3 Enterprise Advanced Security Test

The CrowdStrike Falcon platform started 2024 being recognized as SE Labs’ Best Endpoint Detection and Response 2024 award for the third consecutive year. Adversaries never stop and neither do we — CrowdStrike Falcon is the only platform that provides a unified view of stealthy threats across multiple domains exploited in attack paths.

CrowdStrike Named a Leader in 2024 GigaOm Radar for Container Security

CrowdStrike has been recognized as a Leader and Fast Mover in the 2024 GigaOm Radar for Container Security, marking another milestone in our mission to secure the cloud with the industry's most unified and comprehensive cloud security solution. Kubernetes has become the fastest-growing project in the history of open-source software — more than 60% of enterprises have adopted it.

Falcon Cloud Security Application Security Posture Management: Demo Drill Down

Protecting your software from adversaries requires a precise understanding of production. Watch how Falcon ASPM empowers security teams to stop adversaries from breaching their custom applications. CrowdStrike Falcon ASPM: Prioritize and mitigate cloud threats with unmatched application visibility and business context. Subscribe and Stay Updated: ► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos.

See Falcon Cloud Security in Action

Cloud exploitation grew 95% over the past year, with adversaries becoming even more focused and persistent. Watch how Falcon Cloud Security stops breaches with truly unified agent and agentless protection, from endpoint to cloud. CrowdStrike Falcon Cloud Security: ► Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud security for complete visibility and protection.

80% of Cybersecurity Leaders Prefer Platform-Delivered GenAI for Stronger Defense

Adversaries are advancing faster than ever, exploiting the growing complexity of business IT environments. In this high-stakes threat landscape, generative AI (GenAI) is a necessity. With organizations grappling with skills shortages, sophisticated adversaries and operational complexity, 64% of security professionals have already kicked off their GenAI purchase journey.

A Look Back: The Evolution of Latin American eCrime Malware in 2024

The Latin American (LATAM) cybercrime landscape continues to evolve as adversaries refine their tactics, techniques and procedures (TTPs) to bypass defenses and expand their reach. Last year, we wrote a blog detailing our LATAM cybercrime observations throughout 2023. In this blog, we examine the significant updates observed in 2024 across prominent LATAM malware families, including Mispadu, Kiron, Caiman, Culebra, Salve and Astaroth.

CrowdStrike Named a Leader in GigaOm Radar for Ransomware Prevention

Ransomware continues to be one of the most pervasive and costly cyber threats facing organizations worldwide. More than 40% of organizations surveyed by ESG research experienced a successful ransomware attack in the previous 12 months, and 32% were successfully attacked more than once. The consequences of failing to protect against ransomware can be devastating for any business. Beyond financial loss, victims can suffer operational downtime, reputational damage and potential regulatory fines.

5 Key Data Protection Challenges and How to Overcome Them

Organizations understand their sensitive data is everywhere — and adversaries are after it. Data protection solutions have become an essential part of modern cybersecurity strategies. Organizations realize that in order to avoid a breach, they must have a plan to monitor and control data flow at the user level so they can better understand where data is going, who is accessing it and when malicious activity occurs. But when it comes to deployment and operationalization, things can get complicated.