Exposure Management
CrowdStrike Named a Strong Performer in Forrester Wave for Unified Vulnerability Management
CrowdStrike is proud to be named a Strong Performer in The Forrester Wave™: Unified Vulnerability Management Solutions, Q3 2025. We believe this recognition underscores the strength of CrowdStrike’s v[…]
July 2025 Patch Tuesday: One Publicly Disclosed Zero-Day and 14 Critical Vulnerabilities Among 137 CVEs
Microsoft has addressed 137 vulnerabilities in its July 2025 security update release, more than double the number of vulnerabilities in June. This month's patches include fixes for one publicly disclo[…]
Falcon Exposure Management’s AI-Powered Risk Prioritization Shows Organizations What to Fix First
As the attack surface expands and the number of vulnerabilities grows, organizations face a new crisis: how to prioritize which vulnerabilities to fix first based on their level of risk. CrowdStrike F[…]
June 2025 Patch Tuesday: One Zero-Day and Nine Critical Vulnerabilities Among 66 CVEs
Microsoft has addressed 66 vulnerabilities in its June 2025 security update release. This month's patches include fixes for one actively exploited zero-day vulnerability and nine Critical vulnerabilit[…]
CrowdStrike Elevates XIoT Security with AI-Powered Insights
As organizations increasingly rely on connected devices to drive efficiency and innovation, the Extended Internet of Things (XIoT) — covering industrial control systems (ICS), operational technology ([…]
May 2025 Patch Tuesday: Five Zero-Days and Five Critical Vulnerabilities Among 72 CVEs
Microsoft has addressed 72 vulnerabilities in its May 2025 security update release. This month's patches include fixes for five actively exploited zero-day vulnerabilities, including a zero-day vulner[…]
April 2025 Patch Tuesday: One Zero-Day and 11 Critical Vulnerabilities Among 121 CVEs
Microsoft has addressed 121 vulnerabilities in its April 2025 security update release. This month's patches include fixes for one actively exploited zero-day vulnerability and 11 Critical vulnerabilit[…]
CrowdStrike Falcon Exposure Management Expands Security to Unmanaged Network Assets with Network Vulnerability Assessment
As organizations strengthen endpoint and cloud security, attackers are shifting their focus to often-overlooked network infrastructure like routers, switches, and firewalls. Legacy vulnerability manag[…]
Securing XIoT in the Era of Convergence and Zero Trust
The rise of connected devices has fundamentally reshaped industries, enabling unprecedented levels of automation, efficiency, and innovation. These devices fall under the Extended Internet of Things ([…]
4 Key Steps to Prevent Subdomain Takeovers
Adversaries don’t need to force their way in when they can slip through an organization’s overlooked assets. Subdomain takeovers are a prime example of how attackers exploit misconfigured or abandoned[…]
- 1
- 2
- 3
- 4
- ...
- 10
- >