Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Named a Customers' Choice in 2025 Gartner Peer Insights Voice of the Customer for User Authentication Report

CrowdStrike has been named a Customers’ Choice in the 2025 Gartner Peer Insights “Voice of the Customer for User Authentication” report. We have the most five-star ratings of any vendor evaluated in the report and a 97% Willingness to Recommend rating, based on 206 overall responses as of February 28, 2025.

Falcon Identity Protection Innovations Stop Insider Risk, Secure Non-Human Identities, and Lock Down Privileged Access

How do you stop identity-based attacks in real time — across both human and non-human identities? CrowdStrike Falcon Identity Protection now delivers powerful new capabilities to answer that question. The innovations announced today address urgent challenges facing security teams: unprotected non-human identities (NHIs) such as service accounts, insider risk during employee offboarding, and standing privileges in hybrid Microsoft environments.

CrowdStrike and Microsoft Unite to Harmonize Cyber Threat Attribution

In cybersecurity, understanding an adversary’s identity, capabilities, and intent is critical to intelligent cyber defense. Attribution matters. Despite cyber threat intelligence tracking a multitude of threat actors for many decades, accurately attributing malicious activity continues to be difficult. Vendors and researchers often see different parts of the same puzzle — or entirely different puzzles — due to differences in telemetry.

CrowdStrike Named a Frost Radar Leader in Cloud and Application Runtime Security

CrowdStrike has been named an innovation and growth Leader in the inaugural 2025 Frost Radar: Cloud and Application Runtime Security (CARS), positioned highest on the Innovation Index among all vendors evaluated. This marks another milestone in our mission to stop breaches with the industry's most unified and comprehensive cloud runtime protection.

Falcon Adversary OverWatch with Next-Gen SIEM

Discover how CrowdStrike Falcon Adversary OverWatch with Next-Gen SIEM expands threat hunting across endpoints, identities, cloud, and third-party data to stop breaches quickly. By correlating subtle signals and enhancing them with world-class intelligence, OverWatch helps detect threats earlier and reduce alert fatigue. Gain 24/7 proactive threat hunting across your entire environment because breaches never wait.

AI Powered Risk Scoring with Falcon Next-Gen SIEM

Speed and precision are critical to stopping fast-moving threats. Falcon Next-Gen SIEM uses AI-powered risk scoring to help security teams focus on what matters most. By analyzing behavior, threat actor ties, prevention history, and business context, it surfaces high-risk threats automatically—driving smarter triage and faster response. Risk scoring powers UEBA for deeper, contextual visibility across users and assets. With dynamic prioritization and real-time insights, teams can cut through noise and act quickly.

Charlotte AI - Agentic Workflows - Impossible Time Travel

Logins from New York and Singapore—two minutes apart? That’s not time travel, that’s trouble. CrowdStrike’s Charlotte AI spots these impossible login anomalies instantly. By correlating RDP activity, calculating travel speeds, and taking risk-based action, Charlotte AI Agentic Workflows deliver real-time response to your SOC. No dashboards. No log diving. Just lightning-fast threat detection and action.

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them.

CrowdStrike Elevates XIoT Security with AI-Powered Insights

As organizations increasingly rely on connected devices to drive efficiency and innovation, the Extended Internet of Things (XIoT) — covering industrial control systems (ICS), operational technology (OT), Internet of Things (IoT), and Internet of Medical Things (IoMT) — has rapidly expanded. This greater connectivity often drives increased vulnerability as critical assets are exposed to sophisticated threats.