Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft E3 vs E5: Understanding the Security Coverage You Already Own

Assessing Microsoft E3 and E5 is less about the license tier and more about understanding the security coverage you already own. In our conversation, Todd and Garrett break down what often gets missed in the E3 → E5 journey: Organizations move to E5 without clearly understanding:⇢ what coverage they already have with E3⇢ what incremental capabilities E5 actually adds⇢ and whether those capabilities are being adopted at all.

Eliminate AppSec Noise: Jit's AI Agents Find Real Exploitable Risks

Application security scanners generate endless alerts, but most don’t translate into real risk. Meet Sera, Jit’s AI-powered Security Evaluation and Remediation Agent. Sera automatically connects scanner findings, uncovers toxic combinations, and explains exploitable attack paths—saving AppSec teams hours of manual investigation. See how AI Agents eliminate noise, automate investigations, and deliver clarity so your team can focus on what matters.

Unlocking AI Data Security: Strategic Solutions

AI systems are no longer experimental. They sit at the center of product experiences, internal workflows, and customer-facing automation. As soon as an AI feature ships, it starts handling real data. Customer messages. Internal documents. Support tickets. Logs. Training samples. That’s when AI data security stops being an abstract concern and becomes a product requirement.

How the Model Context Protocol Is Redefining Zero Trust for AI Agents

As Artificial Intelligence (AI) agents become more autonomous by accessing critical systems and acting without real-time human oversight, they are evolving from productivity tools into active Non-Human Identities (NHIs) like service accounts or API keys that require the same oversight and controls as human users. This shift expands organizational attack surfaces, introducing new security risks related to overprivileged access and lateral movement of NHIs across cloud infrastructure.

CrowdStrike's Journey in Customizing NVIDIA Nemotron Models for Peak Accuracy and Performance

Today’s security teams need AI models that can reason over massive telemetry and support autonomous actions. At CrowdStrike, we're working closely with NVIDIA to operationalize NVIDIA Nemotron open models1, building on our existing integration of Nemotron on Amazon Bedrock within the CrowdStrike Falcon platform. This collaboration enables us to rigorously test and adapt large language models (LLMs) for security-specific workloads while maintaining production-grade performance and security.

Cloud vs On-Premised SIEM: One or the Other or Both?

While Hamlet asked the existential question “to be or not to be,” most security teams ask an equally esoteric question that ultimately defines their ability to manage alerting and detection: “to deploy on-prem or in the cloud?” When adopting a security information and event management (SIEM) solution, organizations must make a foundational decision around whether to deploy the solution on-premises or in the cloud.