You Can't Secure AI Agents You Haven't Found

Most organizations have a reasonable handle on their sanctioned SaaS apps. Model Context Protocol - hit 10,000 public servers within a year of launch, with 97 million monthly SDK downloads. None of those numbers capture the servers your developers configured locally. Those don't appear in any registry. They were added at the IDE level, one developer at a time, with no approval step and nothing that touches a central system. That's the inventory problem. It comes before any question of enforcement.

Falcon Exposure Management AI Inventory: Demo Drill Down

AI adoption is accelerating across the enterprise, but governance isn’t keeping pace—leaving security teams without a clear view of what AI is running, how it’s being used, and where it introduces exposure. In this Demo Drill Down, we showcase AI Inventory in Falcon Exposure Management, delivering a centralized view of AI across hosts—from local LLMs and MCP servers to IDE extensions, packages, and applications.

Nine Seconds to Delete a Database: What the PocketOS Incident Teaches Us About AI Agent Privilege Management

There’s never a good time to lose a production database, but losing one to your own AI coding agent on a Friday afternoon has to rank near the bottom of the list. That’s the backdrop to the PocketOS incident, and it’s the clearest case yet for why AI agent security and intent-based access control belong at the top of every cloud security roadmap this year.

How Blockchain Is Reshaping Banking Infrastructure

Blockchain adoption in banking is moving from experimentation to production. In this session, Fireblocks Financial Markets Economist Neil Chopra breaks down where banks, fintechs, and non-bank competitors are already live, what wallet infrastructure means for onchain ownership and control, and why stablecoins are proving the utility case that's pulling the rest of the market forward.

Federated Search: Access Data Beyond Your SIEM-Instantly

See how CrowdStrike Falcon Next-Gen SIEM Federated Search enables security teams to access and query data beyond the SIEM—instantly, and without rehydration. In this demo, you’ll learn how to search data directly where it lives, including external sources like Amazon S3, Falcon LogScale, and NDR platforms, using a single query language.

How Zero Standing Privileges Defuses the Shadow AI Agent Problem

As more organizations move past experimentation and start planning real AI agent deployments, the same set of concerns keeps surfacing in our conversations with security teams. Whether the worry is a shadow agent that shows up uninvited or a sanctioned agent going rogue, the questions tend to cluster around control: These are the right questions to be asking, and they share a common answer that’s more concrete than most people expect. AI agents are only as dangerous as the privileges they can reach.

Wallet infrastructure is the new core banking layer

Owning the UI used to mean owning the customer. On blockchain, whoever controls the wallet controls the relationship. In this clip from the Banking Bootcamp, Fireblocks Financial Markets Economist Neil Chopra breaks down why wallet infrastructure is becoming the central layer for digital asset services at banks, and walks through the three use cases scaling in production today: custody and brokerage, stablecoin payments, and tokenization.

"Just looking at code and finding vulnerabilities is not going to stop breaches."

CrowdStrike CEO and Founder George Kurtz discusses with Dan Ives of Wedbush Securities why frontier AI models won’t replace cybersecurity platforms: stopping breaches requires proprietary data, real-time decisions, enterprise-grade support and the ability to act in milliseconds.

Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection

CVE-2026-3854 is a command injection vulnerability in GitHub Enterprise Server. It lives in the git push pipeline. User-supplied push option values were not properly sanitized before being embedded in an internal service header. The header format used a delimiter that could also appear in user input. A crafted push option containing that delimiter let an attacker inject additional metadata fields. Downstream services treated those fields as trusted internal values.