Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Normalize your data with the OCSF Common Data Model in Datadog Cloud SIEM

Security teams rely on SIEMs to aggregate and analyze data from a wide range of sources, including cloud environments, identity providers, endpoint protection platforms, network appliances, SaaS apps, and more. But every source delivers logs in its own format, with different field names, structures, and semantics. This fragmentation makes it difficult to build scalable, reusable detection rules or correlate threats across systems.

Switching to eBPF One Step at a Time with Calico DNS Inline Policy

Calico Enterprise lets users write network policies using domain names instead of IP addresses. This is done by dynamically mapping domain names to IP addresses and matching the egress traffic against these IPs. We have discussed this feature in detail when we introduced the Inline mode for the eBPF data plane in Calico Enterprise 3.20 release! It addresses the latency and performance issues of the various modes used by Calico in iptables/nftables data planes.

Are Your Web Apps Vulnerable to Infostealers Hiding in Browser Scripts?

Infostealers don’t behave like traditional malware. They work silently in the browser — the client side — harvesting saved passwords, session tokens, credit card data, and more. Attackers use common browser behaviors (JavaScript execution, third-party scripts, DOM manipulations) to: These threats often bypass traditional server-side or endpoint protection, making them invisible to most security tools unless you’re monitoring the browser itself.

Bridge the Gap: Federated Project Collaboration for AEC Teams With Egnyte

In architecture, engineering, and construction (AEC), collaboration across firms isn’t optional—it’s fundamental. Whether you’re working with architects, consultants, general contractors, or subcontractors, sharing data efficiently is critical to project success. Yet, most file-sharing methods between firms are outdated, risky, and operationally difficult.

CrowdStrike Named a Leader in the 2025 IDC MarketScape for CNAPP

We’re proud to announce that CrowdStrike has been named a Leader in the IDC MarketScape: Worldwide Cloud-Native Application Protection Platform 2025 Vendor Assessment (doc, June 2025). This recognition marks another milestone for CrowdStrike as cloud security becomes central to stopping modern cyber threats across hybrid and multi-cloud environments.

Falcon Exposure Management's AI-Powered Risk Prioritization Shows Organizations What to Fix First

As the attack surface expands and the number of vulnerabilities grows, organizations face a new crisis: how to prioritize which vulnerabilities to fix first based on their level of risk. CrowdStrike Falcon Exposure Management addresses this challenge with new AI-powered capabilities to help defenders identify what matters most and take action with precision. New innovations include AI-powered Asset Criticality, Client-Side Attack Path Analysis, and a CrowdStrike Falcon Next-Gen SIEM integration.

GDPR vs CCPA: The Differences You Need to Know

The European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are two essential and well-known regulations designed to protect user data. However, despite the similarities, there are major differences between them. To help you gain more clarity on GDPR vs CCPA, we will explain the similarities and differences, so you can understand more about how both can help you manage your data. Table of contents.

The User Risk Puzzle: Why Your Security Tools Don't Add Up

As a security leader, you face an inevitable daily reality: a flood of alerts pouring in from dozens of different tools. Risky sign-ins are flagged in Microsoft 365, weak passwords are pinged from a vault audit, and a separate report identifies which employees failed the latest phishing simulation. While all this information is valuable, most leaders are unable to connect these separate data points to paint a clear, cohesive picture of an individual user’s overall risk.

The Mother of All Breaches: A Corporate Credential Security Wake-Up Call

Cybersecurity researchers uncovered what is being called the "mother of all breaches," a colossal dataset containing 16 billion login credentials, including user passwords for Google, Facebook, and Apple. To put that figure in context, the cache represents twice the current human population of the Earth. This event was not the result of a single breach, but likely a compilation of data stolen from multiple breaches over many years.