recent Articles
5 Best Practices to Secure Azure Resources
Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also[...]
CrowdStrike Launches SEC Readiness Services to Prepare Boardrooms for New Regulations
CrowdStrike is today debuting CrowdStrike SEC Readiness Services to guide organizations along the path to compliance as they navigate the new SEC cybersecurity disclosure rules. These services, powered by the[...]
March 2024 Patch Tuesday: Two Critical Bugs Among 60 Vulnerabilities Patched
Microsoft has released security updates for 60 vulnerabilities in its March 2024 Patch Tuesday rollout. There are two Critical vulnerabilities patched (CVE-2024-21407 and CVE-2024-21408), both of which affect the Hyper-V[...]
CrowdStrike a Research Participant in Two Latest Center for Threat-Informed Defense Projects
As a global cybersecurity industry leader and a Research Partner for the MITRE Engenuity Center for Threat-Informed Defense, CrowdStrike provided expertise and thought leadership to two of the Center[...]
Falcon Cloud Security Supports GKE Autopilot to Secure More GCP Workloads
In the ever-evolving landscape of cloud security, staying ahead of the curve is paramount. Today, we are announcing an exciting enhancement: CrowdStrike Falcon® Cloud Security now supports Google Kubernetes Engine[...]
CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security
I’m thrilled to announce CrowdStrike’s agreement to acquire Flow Security, a pioneer in data security posture management (DSPM) and the industry’s first and only cloud data runtime security solution. With[...]
Does Your MDR Deliver Outcomes — or Homework?
At CrowdStrike, we’re on a very simple mission: We stop breaches. It’s easy for us to make this claim but challenging to put into practice and maintain day in and[...]
Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike
When Tahir Ali became CTO and CISO at Montage Health in 2021, he inherited a unique set of cybersecurity challenges. For one, the healthcare sector was getting bombarded with attacks,[...]
The Anatomy of an ALPHA SPIDER Ransomware Attack
ALPHA SPIDER is the adversary behind the development and operation of the Alphv ransomware as a service (RaaS). Over the last year, ALPHA SPIDER affiliates have been leveraging a[...]
After Years of Success, State of Wyoming Looks to Expand CrowdStrike Protections Statewide
With its wild beauty, favorable tax laws and growing tech scene, the State of Wyoming is experiencing a surge in business growth. But with this prosperity comes a rise in[...]