Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lightboard Lab: Closing the Valley of Visibility in Network Vulnerability Assessment

Network Vulnerability Assessment is often treated as a point-in-time exercise—but real environments don’t stand still. Between long scan cycles, two things are constantly changing: network devices drift as configurations and versions evolve, and the world around them shifts as new vulnerabilities are disclosed.

George Kurtz + Dan Ives on AI Agents Bypassing Security Policies

One AI agent didn’t have permission to fix an issue… so it asked another agent with access to do it. Another? It rewrote the security policy to achieve its goal. This isn’t theory. This is happening. George_Kurtz sat down with DivesTech to discuss why AI needs guardrails.

Hunting Supply Chain Attacks with Jared Myers, Director, CrowdStrike OverWatch

Supply chain attacks targeting AI have recently been making headlines — and keeping the CrowdStrike OverWatch team busy. Jared Myers, director of CrowdStrike OverWatch, joins Adam in this episode to discuss his team’s approach to detecting and responding to these attacks.

Lightboard Lab: How to Secure Non-Human Identities Against Modern Threats

See how CrowdStrike Falcon Next-Gen Identity Security provides complete visibility, control, and protection across human and non-human identities. By unifying visibility, secure privileged access, and real-time detection and response, CrowdStrike stops identity-driven attacks before they begin. Subscribe and stay updated!

Falcon Next-Gen SIEM & Onum: Real-Time Telemetry Control and Federated Search

Discover how Falcon Onum and Falcon Next-Gen SIEM work together to optimize telemetry upstream and enable federated search across hot and archived data. Reduce ingestion overhead, maintain full visibility, and investigate across multiple data stores from a single platform.

How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed

When a new vulnerability is disclosed, security leaders want to know whether they’re exposed. In many organizations, the answer still depends on scan cycles that lag behind exposure — an architectural delay. Adversaries are moving faster: The average eCrime breakout time fell to 29 minutes in 2025, and the fastest was only 27 seconds, the CrowdStrike 2026 Global Threat Report found.

Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

The Claude Mythos Preview matters for every enterprise. Frontier models raise the ceiling for both offense and defense. Our job is to make sure defenders hold the advantage. That is what we have always done. That is what we do today. Today, CrowdStrike is a founding member of Project Glasswing. Anthropic builds the model. CrowdStrike secures AI where it executes. That’s the division of labor the industry needs.