David Puzas
Make Cloud Defense a Team Sport by Turning DevOps into a Force Multiplier
Enterprises are embracing cloud-native applications in the name of business agility. These applications enable developers to take advantage of the cloud’s scalability and flexibility, allow customers […]
Do You Know Who’s in Your Cloud? Preventing Identity-Based Threats with CIEM
As organizations continue to shift to multi-cloud environments and increasingly use cloud services for application development, new challenges emerge that require dramatic changes in the delivery and […]
GitOps and Shift Left Security: The Changing Landscape of DevSecOps
Application developers have always had a tricky balance to maintain between speed and security, two requirements that may often feel at odds with each other. Practices that increase speed also pressur[…]
Top Threats You Need to Know to Defend Your Cloud Environment
The CrowdStrike eBook, “Protectors of the Cloud: Combating the Rise in Threats to Cloud Environments," reveals how adversaries target and infiltrate cloud environments and recommends best practices fo[…]
Runtime Protection: The Secret Weapon for Stopping Breaches in the Cloud
Mistakes are easy to make, but in the world of cloud computing, they aren’t always easy to find and remediate without help. Cloud misconfigurations are frequently cited as the most common causes of br[…]
Why You Need an Adversary-focused Approach to Stop Cloud Breaches
It should come as little surprise that when enterprise and IT leaders turned their attention to the cloud, so did attackers. Unfortunately, the security capabilities of enterprises have not always kep[…]
5 Common Hybrid IT Security Challenges and How to Overcome Them
Digital transformation has pushed organizations to adopt a hybrid IT approach and has created a mix of on-premises and cloud infrastructure that has to be supported and protected. Unfortunately, while[…]
Four Key Factors When Selecting a Cloud Workload Protection Platform
Security budgets are not infinite. Every dollar spent must produce a return on investment (ROI) in the form of better detection or prevention. Getting the highest ROI for security purchases is a key c[…]
Shift Left Security: The Magic Elixir for Securing Cloud-Native Apps
Developing applications quickly has always been the goal of development teams. Traditionally, that often puts them at odds with the need for testing. Developers might code up to the last minute, leavi[…]
Stop Cloud Breaches With Threat Graph Cloud-Powered Analytics: Intelligent, Automated, Accurate
Drawing benefits from CrowdStrike’s network effect requires handling large amounts of data — volumes and volumes of it. In fact, CrowdStrike stores more than 15 petabytes of data in the cloud that it […]
- 1
- 2
- >