Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Elevates XIoT Security with AI-Powered Insights

As organizations increasingly rely on connected devices to drive efficiency and innovation, the Extended Internet of Things (XIoT) — covering industrial control systems (ICS), operational technology (OT), Internet of Things (IoT), and Internet of Medical Things (IoMT) — has rapidly expanded. This greater connectivity often drives increased vulnerability as critical assets are exposed to sophisticated threats.

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them.

Navigating FedRAMP Compliance: Why It's Crucial for Mobile Security

If your organization handles United States federal government data in cloud environments, it’s often a requirement to use FedRAMP-authorized solutions. The Federal Risk and Authorization Management Program (FedRAMP) provides consistent standards for protecting unclassified data that passes between the federal government and privately owned third parties.

CISO Spotlight: Mike Wilkes on Building Resilience in an Evolving Threat Landscape

Mike Wilkes has had a career many cybersecurity professionals could only dream of. An adjunct professor, former CISO of Marvel and MLS, member of the World Economic Forum, drummer, and board member at the National Jazz Museum in Harlem, his interests and achievements are as eclectic as they are impressive.

Welcome to Snyk Labs: Charting the Course for AI-Native Security

Software development is in the midst of a monumental shift, powered by the rapid advancements in Artificial Intelligence. AI isn't just changing how we build software; it's transforming the very nature of applications themselves. As AI-native applications become more prevalent, we're also seeing new, complex security threats emerge. Traditional security approaches aren’t designed for the dynamic and often unpredictable nature of Large Language Models (LLMs), agents, and other AI-driven systems.

Web API Authentication and Authorization Step By Step

In an era where APIs are the connective tissue of enterprise ecosystems, authentication and authorization can no longer be treated as mere checklist items. They must become strategic disciplines—crafted thoughtfully to align security with business velocity, regulatory expectations, and evolving threat landscapes.

Is Your API Security Just "Good Enough"? Why That's Not Enough Anymore

APIs serve as the foundation for modern digital innovation, supporting everything from mobile applications to intricate business integrations. However, as their numbers soar, with many companies experiencing annual growth rates of 50-100%, they have also become a significant target for cyber attackers. Relying on "good enough" API security could leave your most vital assets perilously unprotected.

Securing the future of AI Agents: Reflections from the Microsoft Build Stage

Standing on stage at Microsoft Build, surrounded by innovators shaping the future in the era of AI Agents, I felt equal parts inspired and responsible. Inspired by the rapid momentum around AI, and responsible for raising a flag about something we don’t talk about enough - how we secure the very systems that are now acting on our behalf. This post isn’t a recap, rather a continuation, a chance to go deeper into the story I shared (and the one we’re still writing.)

Our AI is scanning the dark web to recover stolen credentials right now. #cybersecurity #ai #vendor

Our AI is scanning the dark web right now — here’s what it’s finding. In this cybersecurity short, we give you a real-time glimpse into how AI-driven tools are monitoring the dark web for stolen credentials, emerging threats, and malicious activity before it reaches your business. From detecting leaked passwords to identifying early signs of cyberattacks, AI is transforming threat intelligence and external attack surface management (EASM).