Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Falcon XDR: Why You Must Start With EDR to Get XDR

Since we founded CrowdStrike, one of the things I’m proudest of is our collective ability to work with customers to lead the industry forward. Leadership is more than just being the loudest voice or making wild marketing claims. It’s about listening and working with customers to help them solve their hardest problems to achieve a common goal: stopping breaches.

Falcon XDR: Extending Detection and Response - The Right Way

This week we announced the general availability of CrowdStrike’s newest innovation, Falcon XDR, and I couldn’t be more excited. Using our same single, lightweight agent architecture, Falcon XDR enables security teams to bring in third-party data sources for a fully unified solution to rapidly and efficiently hunt and eliminate threats across multiple security domains.

Lessons learned from the Argo CD zero-day vulnerability (CVE-2022-24348)

On January 30, 2022, , the Argo CD team was contacted by researchers at Apiiro regarding a vulnerability they had discovered in the popular continuous delivery platform that could allow bad actors to steal sensitive information from deployments. The Argo CD team was able to quickly develop fixes for all three of their currently supported releases and publish them to their users within 48 hours.

6 Cybersecurity challenges facing digital banking

Cybersecurity is among the most critical issues facing financial institutions today. Cyberthreats have been on the rise over recent years at the same time digital banking has gained popularity among consumers. Banks that want to meet demand without compromising safety must overcome several key security challenges.

Don't Leave Dollars on the Table: How to Find and Leverage Federal Funding

By now it’s become clear—hybrid and remote work are here to stay. This goes for employees in the government sector as much as it does for those in other industries. Along with increased flexibility, however, comes increased attack surfaces for security professionals to defend.

SAST and SCA: Better together with Snyk

As applications become more complex, so does the task of securing them. While the source code making up applications consists of proprietary code, a great deal of it is also third-party, open source code. Development and security teams looking to release secure code while also maintaining a rapid pace of development, need to therefore combine static application security testing (SAST) and software composition analysis (SCA) as part of a comprehensive software security strategy.

Kubernetes Security Posture Review and Cross-Cluster Restores with New CloudCasa Release

We’re officially more than halfway through winter here in the northern hemisphere, and although that famous Pennsylvania groundhog Punxsutawney Phil has just predicted six more weeks of cold and snow, we have some good news that we think helps make up for it. We’re announcing a major new release of CloudCasa features!

The Big Fix 2022 - Getting started with VS Code IDE security fixes

The Big Fix brings together developers, DevOps, and security practitioners of all skill levels to help make the internet more secure. Our goal is to make security 100x better in 2022 by finding and fixing 202,200 security vulnerabilities! Join us to help find and fix security vulnerabilities while making friends and winning swag. In this short video Developersteve will help you get started finding security vulnerabilities in your applications using VS Code's Snyk extension to scan a project's manifest (open source libraries!) as well as your own code (static application security testing!)

Artificial Engagement & Ad Fraud | Cybersecurity Sessions #4

In this month’s episode, we’re talking about ad fraud and the role bots play in this lucrative space. Marketers care intensely about engagement and pay advertisers good money to get it, but how do they know they aren’t paying for visits from malicious bots? And what other kinds of harm do ad fraud bots cause businesses as a result? To find out, Andy invites Beacon’s Stewart Boutcher onto the Cybersecurity Sessions. As two CTOs focused on tackling bots, but from different perspectives, Andy and Stewart find plenty to discuss!

How federal agencies can revamp their mobile security posture

Cybersecurity is an increasing concern for the federal government, particularly with a larger remote workforce to manage than in the past. Changes in the distributed nature of IT networks make it even more critical to stay ahead of newer threats like ransomware and spyware. Lookout’s Vice President for Public Sector Tony D’Angelo, in a new CyberScoop interview, highlights the importance of reprioritizing mobile device security to establish a more secure network security posture. D’Angelo explains how mobile threat defense solutions help security leaders safeguard sensitive enterprise data from cyberthreats that exploit users, apps and devices. He also highlights endpoint detection and response strategies that elevate mobile security when implementing a zero-trust architecture. Watch the full interview with Tony D’Angelo and learn more about reprioritizing mobile device security to establish a more secure network security posture.