Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Named a Frost Radar Leader in Cloud and Application Runtime Security

CrowdStrike has been named an innovation and growth Leader in the inaugural 2025 Frost Radar: Cloud and Application Runtime Security (CARS), positioned highest on the Innovation Index among all vendors evaluated. This marks another milestone in our mission to stop breaches with the industry's most unified and comprehensive cloud runtime protection.

Comprehensive Guide to Implementing Asset Monitoring Solutions

Are you seeking support to avoid unexpected asset malfunctions? Companies utilize asset monitoring solutions to maintain equipment operations without disruptions while protecting against costly downtime periods and extending the life of important infrastructure. Here's the good news... These solutions implement more easily than anticipated but yield substantial advantages. Our guide demonstrates all necessary steps to establish an efficient asset monitoring system for your business.

Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari

Today, SquareX released new threat research on an advanced Browser-in-the-Middle (BitM) attack targeting Safari users. As highlighted by Mandiant, adversaries have been increasingly using BitM attacks to steal credentials and gain unauthorized access to enterprise SaaS apps. BitM attacks work by using a remote browser to trick victims into interacting with an attacker-controlled browser via a pop-up window in the victim's browser.

Protecting Government Agencies From Mobile Threats: A Guide

If you work for (or alongside) the United States government, then threat actors want your sensitive data. In 2023, federal agencies fell victim to 11 major cybersecurity incidents, with threats continuing to evolve well into 2024. Safeguarding federal and critical infrastructure organizations requires a modern cybersecurity framework. In today’s mobile-enabled workplaces, that means extending your data protection strategy to wherever devices are being used.

Charlotte AI - Agentic Workflows - Impossible Time Travel

Logins from New York and Singapore—two minutes apart? That’s not time travel, that’s trouble. CrowdStrike’s Charlotte AI spots these impossible login anomalies instantly. By correlating RDP activity, calculating travel speeds, and taking risk-based action, Charlotte AI Agentic Workflows deliver real-time response to your SOC. No dashboards. No log diving. Just lightning-fast threat detection and action.

Ensuring ISO/IEC 23894:2023 Compliance for AI Systems with AppTrana WAAP

ISO/IEC 23894:2023 is a relatively new international standard focused on AI risk management. It is designed to help organizations manage risks arising from the development, deployment, and use of Artificial Intelligence (AI) systems. While it’s AI-specific, many of its security-related clauses—especially those concerning web applications, APIs, and external-facing systems—apply broadly to ensure AI systems are secure, trustworthy, and resilient.

AI Is Reshaping Software. Is Your Security Strategy Keeping Up?

Software development is undergoing its biggest shift since the rise of cloud and DevOps. The difference this time? The shift is being driven by artificial intelligence, and it’s moving fast. AI-powered coding tools have rapidly made their way into developer workflows. Agents and LLMs are helping teams move faster, automate more, and build in entirely new ways. But speed often comes with tradeoffs.

Welcome-to-The New Era of AI-Driven Development

Artificial intelligence is no longer a future consideration. It’s here — and it’s changing how software is built. Fast. Enterprise teams are moving beyond AI pilots and proof-of-concepts. They’re rolling out real-world, high-value use cases and doing it at scale. According to IDC forecasting, AI spend will more than double by 2028. At the center of that surge is AI-assisted software development.

New in Breach Risk: Threat Monitoring Powered by an AI Analyst #cybersecurity #tprm #ai #security

Peter, Senior Product Marketing Manager at UpGuard, shares how our new Threat Monitoring feature helps security teams detect and triage real threats across the open, deep, and dark web—faster and with more clarity. Now in early access. Talk to your UpGuard rep to get started.