Recent Blogs
How Cushman & Wakefield Secures Identities with Falcon Identity Protection
For years, Cushman & Wakefield’s security team knew that remote desktop protocol (RDP) access was a potential weak point, but enforcing multifactor authentication (MFA) for RDP was out of reach. The c[…]
CrowdStrike Falcon Cloud Security Adds Detections for AWS IAM Identity Center
CrowdStrike Falcon® Cloud Security now delivers real-time detections for AWS IAM Identity Center, helping organizations detect and respond to identity-driven cloud threats before they escalate. A few […]
Essential Components of a Cloud Runtime Protection Strategy
Securing cloud environments at runtime is no easy feat. Unlike traditional infrastructure, cloud workloads are dynamic, ephemeral, and often span multiple platforms — making continuous visibility a mo[…]
CrowdStrike Research: Securing AI-Generated Code with Multiple Self-Learning AI Agents
CrowdStrike data scientists have undertaken research into developing innovative new self-learning, multi-agent AI systems that employ Red Teaming capabilities This new approach, presented at the NVIDI[…]
CrowdStrike Wins Google Cloud Security Partner of the Year Award, Advances Cloud Security for Joint Customers
CrowdStrike has won the 2025 Google Cloud Security Partner of the Year Award for Workload Security, recognizing our leadership in securing cloud environments at scale. Announced at Google Cloud Next 2[…]
April 2025 Patch Tuesday: One Zero-Day and 11 Critical Vulnerabilities Among 121 CVEs
Microsoft has addressed 121 vulnerabilities in its April 2025 security update release. This month's patches include fixes for one actively exploited zero-day vulnerability and 11 Critical vulnerabilit[…]
CrowdStrike Secures AI Development with NVIDIA
We’re excited to share that CrowdStrike Falcon® Cloud Security now offers enhanced tools to help secure artificial intelligence (AI) development, simplify AI security posture management, and quickly r[…]
How to Navigate the 2025 Identity Threat Landscape
Identity is at the center of the fight against adversaries. As threat actors weaponize legitimate credentials and sell access to the highest bidders, organizations must proactively detect and secure e[…]
Kubernetes IngressNightmare Vulnerabilities: What You Need to Know
We would like to recognize Amit Serper, Travis Lowe, Tony Gore, Adrian Godoy, Mihai Vasilescu, Suraj Sahu, Pablo Ramos, Raj Jammalamadaka, Lacie Griffin, and Josh Grunzweig for their contributions in […]
CrowdStrike Falcon Exposure Management Expands Security to Unmanaged Network Assets with Network Vulnerability Assessment
As organizations strengthen endpoint and cloud security, attackers are shifting their focus to often-overlooked network infrastructure like routers, switches, and firewalls. Legacy vulnerability manag[…]