David Puzas
Make Cloud Defense a Team Sport by Turning DevOps into a Force Multiplier
Enterprises are embracing cloud-native applications in the name of business agility. These applications enable developers to take advantage of the cloud’s scalability and flexibility, allow customers […]
Do You Know Who’s in Your Cloud? Preventing Identity-Based Threats with CIEM
As organizations continue to shift to multi-cloud environments and increasingly use cloud services for application development, new challenges emerge that require dramatic changes in the delivery and […]
GitOps and Shift Left Security: The Changing Landscape of DevSecOps
Application developers have always had a tricky balance to maintain between speed and security, two requirements that may often feel at odds with each other. Practices that increase speed also pressur[…]
Top Threats You Need to Know to Defend Your Cloud Environment
The CrowdStrike eBook, “Protectors of the Cloud: Combating the Rise in Threats to Cloud Environments," reveals how adversaries target and infiltrate cloud environments and recommends best practices fo[…]
Runtime Protection: The Secret Weapon for Stopping Breaches in the Cloud
Mistakes are easy to make, but in the world of cloud computing, they aren’t always easy to find and remediate without help. Cloud misconfigurations are frequently cited as the most common causes of br[…]
Why You Need an Adversary-focused Approach to Stop Cloud Breaches
It should come as little surprise that when enterprise and IT leaders turned their attention to the cloud, so did attackers. Unfortunately, the security capabilities of enterprises have not always kep[…]
5 Common Hybrid IT Security Challenges and How to Overcome Them
Digital transformation has pushed organizations to adopt a hybrid IT approach and has created a mix of on-premises and cloud infrastructure that has to be supported and protected. Unfortunately, while[…]
Four Key Factors When Selecting a Cloud Workload Protection Platform
Security budgets are not infinite. Every dollar spent must produce a return on investment (ROI) in the form of better detection or prevention. Getting the highest ROI for security purchases is a key c[…]
Shift Left Security: The Magic Elixir for Securing Cloud-Native Apps
Developing applications quickly has always been the goal of development teams. Traditionally, that often puts them at odds with the need for testing. Developers might code up to the last minute, leavi[…]
Stop Cloud Breaches With Threat Graph Cloud-Powered Analytics: Intelligent, Automated, Accurate
Drawing benefits from CrowdStrike’s network effect requires handling large amounts of data — volumes and volumes of it. In fact, CrowdStrike stores more than 15 petabytes of data in the cloud that it […]
Community Power: The CrowdStrike Security Cloud Network Effect
There’s a popular saying that it takes a village to raise a child. The cybersecurity version of this idiom is that it requires a community to protect the cloud. At CrowdStrike, this means using the Cr[…]
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure
More than ever, organizations are grappling with how to secure cloud-native applications. Protecting these applications — a combination of containers, virtual machines, APIs and serverless functions —[…]
Do You Know What’s Hiding in Your Containers?
Between the growth of cloud-native applications and the demands of faster application delivery, the use of containers is widely predicted to continue to increase. In fact, a recent study conducted by […]
Two Sides of the Same Coin: Protecting Data in the Cloud Is a Shared Responsibility
In the era before cloud computing, enterprises could expect to be responsible for securing everything — the systems in the data center, their applications, everything. Today, cloud service providers a[…]
To Get Cloud Security Cooking, You Need The Right Recipe For Success
Slow down a development team with security, and expect to be greeted with a wave of frustration. Between a lack of integration of security tools and confusion about shared responsibility, security tea[…]
So You Think Your Containers Are Secure? Four Steps to Ensure a Secure Container Deployment
The need for speed and agility in today’s digital business requires changes to IT infrastructure, most notably the shift to cloud-native architectures and the adoption of DevOps. This shift has led ma[…]
You Can’t Protect What You Can’t See: Five Cloud Security Must-haves
Many industry analysts project that infrastructure as a service (IaaS) will continue to grow as companies seek ways to slash costs and increase business resilience and agility. While it carries the pr[…]
Modern Infrastructure Requires Modern Cloud Security
Built in the cloud and for the cloud, cloud-native applications are driving digital transformation and creating new opportunities to increase efficiency. Taking a cloud-native approach brings both spe[…]
Clarity in the Cloud: See More, Know More, Do More With Falcon Horizon
The adoption of the cloud has fundamentally changed the game when it comes to how businesses go to market and develop modern applications. Today’s application lifecycle places a premium on speed to ma[…]