CrowdStrike is proud to be named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. We believe this recognition clearly demonstrates the power of the CrowdStrike Falcon® cybersecurity platform and our unwavering commitment to innovation in strengthening…
Category: Cybersecurity Blog | CrowdStrike
Recognizing the Resilience of the CrowdStrike Community
Our annual Fal.Con user conference is always one of the highlights of my year because it’s a chance to spend time with some of my favorite people: our customers and partners. This year’s event has special meaning for me as…
How CrowdStrike Hunts, Identifies and Defeats Cloud-Focused Threats
Adversaries’ persistent efforts to evade advancements in threat awareness and defense have shaped a cyber threat landscape dominated by their stealthy, fast-moving tactics. As they expand into the cloud environments where most organizations now operate, the need to hunt and…
Innovations in Falcon Cloud Security at Fal.Con 2024
As we gather for Fal.Con 2024, we’re thrilled to unveil groundbreaking advancements in CrowdStrike Falcon® Cloud Security that are set to redefine cloud security. These innovations are more than just technical enhancements — they’re a bold step towards a future…
CrowdStrike Announces Falcon Identity Protection Innovations for Entra ID and Privileged Access
In the critical and constantly evolving identity security space, organizations are focused on three essential needs: Understanding identity posture: Visualizing and prioritizing risks associated with endpoints, applications and data as part of establishing baselines for user behavior. Proactive threat prevention:…
CrowdStrike Unveils AI Innovations to Expedite Security Operations and Upgrade the Analyst Experience
Modern cybersecurity is a game of speed. With attacks now happening in mere minutes, the agility with which security teams can detect and disrupt adversaries can make the difference between being the hunter or being hunted. However, reclaiming a speed…
CrowdStrike Next-Gen SIEM Innovations Slash Response Time and Simplify SIEM Migrations
Are your legacy technologies slowing down your security operations? You’re not alone. Seventy percent of critical incidents take over 12 hours to resolve. Legacy SIEMs burden security teams with endless manual processes and agonizingly slow search speeds, delaying investigation and…
CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection
Today’s threat landscape is defined by adversaries’ increasing speed and quickly evolving tactics. Now more than ever, it is imperative organizations unify and accelerate their security operations to detect, identify and respond to threats at the rapid pace of the…
AI Innovation in the Spotlight at Fal.Con 2024
Every year, the role of AI in cybersecurity grows more prominent. This is especially true in the security operations center (SOC), where AI-native detection and GenAI-fueled workflows are advancing cyber defense and shaping the end-to-end analyst experience. But while defenders…
August 2024 Patch Tuesday: Six Zero-Days and Six Critical Vulnerabilities Amid 85 CVEs
Microsoft has released security updates for 85 vulnerabilities in its August 2024 Patch Tuesday rollout. These include six actively exploited zero-days (CVE-2024-38213, CVE-2024-38193, CVE-2024-38189, CVE-2024-38178, CVE-2024-38107, CVE-2024-38106). Among the updates is a fix for one of the vulnerabilities related to…
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security
We’re thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes deeper into the…
Exposure Management – Browser Extension Inventory
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Cybersecurity Blog | CrowdStrike Read the original article: Exposure Management – Browser Extension Inventory
Seeing the Unseen: Preventing Breaches by Spotting Malicious Browser Extensions
As workforce productivity increasingly depends on web-based applications, browsers have become essential gateways to the “connectivity economy.” According to recent data, 93% of desktop internet traffic in 2023 traversed through four popular web browsers. With their diverse functionalities and use…
May 2024 Patch Tuesday: Two Zero-Days Among 61 Vulnerabilities Addressed
Microsoft has released security updates for 61 vulnerabilities in its May 2024 Patch Tuesday rollout. There are two zero-day vulnerabilities patched, affecting Windows MSHTML (CVE-2024-30040) and Desktop Window Manager (DWM) Core Library (CVE-2024-30051), and one Critical vulnerability patched affecting Microsoft…
Falcon Fusion SOAR and Machine Learning-based Detections Automate Data Protection Workflows
Time is of the essence when it comes to protecting your data, and often, teams are sifting through hundreds or thousands of alerts to try to pinpoint truly malicious user behavior. Manual triage and response takes up valuable resources, so…
New CrowdStrike Capabilities Simplify Hybrid Cloud Security
CrowdStrike is excited to bring new capabilities to platform engineering and operations teams that manage hybrid cloud infrastructure, including on Red Hat Enterprise Linux and Red Hat OpenShift. Most organizations operate on hybrid cloud1, deployed to both private data centers…
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization
The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments — a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. Larger scale leads to…
Falcon Fund in Focus: Nagomi Helps Customers Maximize Their Cybersecurity Investments
Preventable breaches are a common problem. According to research by Nagomi, a leader in the nascent field of automated security control assessment, 80% of breached organizations already had a tool in place that could have prevented it. One solution is…
5 Best Practices to Secure AWS Resources
Organizations are increasingly turning to cloud computing for IT agility, resilience and scalability. Amazon Web Services (AWS) stands at the forefront of this digital transformation, offering a robust, flexible and cost-effective platform that helps businesses drive growth and innovation. However,…
CrowdStrike Enhances Cloud Detection and Response (CDR) Capabilities to Protect CI/CD Pipeline
The increase in cloud adoption has been met with a corresponding rise in cybersecurity threats. Cloud intrusions escalated by a staggering 75% in 2023, with cloud-conscious cases increasing by 110%. Amid this surge, eCrime adversaries have become the top threat…