Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Protect the Software Supply Chain from Vulnerable Third-Party Code

What happens when the software, scripts and code snippets that your business uses on your website and network have been compromised at the source? The compromise could be unintentional—perhaps the coders simply made a mistake. Or the compromise could be intentional—maybe hackers wrote a malicious script and promoted it as legitimate on a third-party library source to encourage users to download and install.

Cybersecurity predictions and best practices in 2022

While we optimistically hoped for normality in 2021, organizations continue to deal with the repercussions of the pandemic nearly two years on. Once considered temporary measures to ride out the lockdown restrictions, they have become permanent fixtures now, creating a dynamic shift in cybersecurity and networking. At the same time, cybercriminals have taken advantage of the distraction by launching ambitious attacks against critical infrastructure.

Falcon XDR: Delivered at the Speed and Scale of the CrowdStrike Security Cloud

We are thrilled to announce the general availability of CrowdStrike’s newest innovation: Falcon XDR. Founded on our pioneering endpoint detection and response (EDR) technology and the power of the CrowdStrike Security Cloud, Falcon XDR delivers the next generation of unified, full-spectrum extended detection and response (XDR) so security teams can stop breaches faster.

Hello CISO - Episode 3 Part 1: Shadow IT and Working from Home

The migration from the office to WFH exposed a growing security threat that’s been on IT’s radar for years: shadow IT. With more and more workers using apps and services outside the purview of IT, a new way of thinking has emerged to confront the new reality. In part one of this episode of Hello CISO, Troy explains why shadow IT is here to stay, and why the loss of control that it brings isn’t the end of the world.