Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike

CrowdStrike, Intel and Dell: Clustering and Similarity Assessment for AI-driven Endpoint Security with Intel NPU Acceleration

CrowdStrike’s mission is to stop breaches. We continuously research and develop technologies to outpace new and sophisticated threats and stop adversaries from pursuing attacks. We also recognize that security is best when it’s a team sport. In today’s threat landscape, technology collaboration is essential to deploy novel methods of analysis and defense.

Two Effective Strategies to Reduce Critical Vulnerabilities in Applications

Securing custom applications in a sea of vulnerabilities is daunting. To make the task even more challenging, the threat to applications continues to grow: 8 out of the top 10 data breaches last year were related to application attack surfaces.1 This blog details two effective strategies for identifying vulnerabilities in custom software applications so they can be quickly addressed.

CVE-2024-3094 and the XZ Upstream Supply Chain Attack: What You Need to Know

CrowdStrike is committed to protecting our customers from the latest and most sophisticated cybersecurity threats. We are actively monitoring activity surrounding CVE-2024-3094, a recently identified vulnerability in XZ Utils.

Falcon Data Protection Preventing GenAI Data Loss: Demo Drill Down

Though GenAI is a great productivity tool, many organizations risk losing sensitive data. CrowdStrike Falcon® Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach in making GenAI safer for organizations. In this demo, see how easy it is to stop sensitive data from leaking into web-based GenAI tools like ChatGPT.

Building the Modern SOC: How CrowdStrike Deployed Next-Gen SIEM to Increase Search Speed by 150x and Find Issues in Seconds

Imagine you’re up against the world’s most advanced adversaries — those that use automation and AI, can drop malware in seconds and break out from compromised endpoints to navigate target environments in just over two minutes. This is a day in the life of a CrowdStrike SOC engineer.

Falcon Data Protection PCI Egress Prevention: Demo Drill Down

Malicious and accidental leakage of sensitive PCI data will result in compliance violations and regulatory fines for organizations. CrowdStrike Falcon® Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach in stopping unauthorized PCI egresses in real-time. In this demo, see how easy it is to define data classifications and frictionless precedence-based rules that suit your business requirements to effectively stop PCI data loss.

How to Defend Employees and Data as Social Engineering Evolves

Adversaries have long used social engineering to trick their victims into providing access or information not available to the public. Social engineering continues to prove effective and will likely be a major factor in breaches throughout 2024. The CrowdStrike Incident Response team has dealt with an anomalously high number of successful breaches that originated with social engineering tactics, and we strongly urge security teams to take precautions against them.

CrowdStrike Enhances Cloud Detection and Response (CDR) Capabilities to Protect CI/CD Pipeline

The increase in cloud adoption has been met with a corresponding rise in cybersecurity threats. Cloud intrusions escalated by a staggering 75% in 2023, with cloud-conscious cases increasing by 110%. Amid this surge, eCrime adversaries have become the top threat actors targeting the cloud, accounting for 84% of adversary-attributed cloud-conscious intrusions.

See Charlotte In Action

Charlotte AI, CrowdStrike’s conversational AI assistant, enables organizations to turn hours of work into minutes or even seconds. Today’s adversaries are moving fast – and security teams need to move even faster. Charlotte AI enables teams to make faster, more accurate decisions, applying industry-leading generative AI across their workflows with a purpose-built security assistant for modern security teams.

CrowdStrike Counter Adversary Operations Demo

Adversaries are getting faster, so if you aren’t being proactive, you’re already too late. Watch how CrowdStrike Counter Adversary Operations unifies our industry-leading threat intelligence and hunting teams with integrated offerings to stop modern breaches and raise adversaries’ cost of doing business.