Microsoft CrowdStrike HPE edge IBM attack surface ukraine CISA Log4j CISA BlackBerry IoT connected device Bluetooth

CrowdStrike Extends Scope and Reach of Cybersecurity Portfolio

CrowdStrike acquired Flow Security to add DSPM to its portfolio and is offering an MDR service from Dell that integrates with its Falcon XDR ...
Security Boulevard

The Strategic Partnership Elevating API and Endpoint Security

Salt Security has announced a pivotal partnership with CrowdStrike. This collaboration marks a significant milestone for businesses seeking robust, integrated security solutions that cover both endpoints and the increasingly critical API layer ...
A spreadsheet list of integration commands you can use to build a phishing playbook using Office 365, CrowdStrike, Active Directory, Checkpoint, and Recorded Future

How to Build a Phishing Playbook Part 1: Preparation

Automating response to phishing attacks remains one of the core use-cases of SOAR platforms. In 2022, the Anti-Phishing Working Group (APWG) logged ~4.7 million phishing attacks. Since 2019, the number of phishing ...
Microsoft CrowdStrike HPE edge IBM attack surface ukraine CISA Log4j CISA BlackBerry IoT connected device Bluetooth

CrowdStrike Extends AI Approach to Cybersecurity to SMBs

CrowdStrike Falcon Go enables small-to-medium businesses (SMBs) to leverage machine learning algorithms to secure their IT environments ...
Security Boulevard
audit Box data security, management, organizations, GDPR, Strike Force privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security

Box Allies With CrowdStrike to Better Secure Files

A Box, Inc. and CrowdStrike alliance will make tools available to secure files and data shared via Box's cloud service ...
Security Boulevard
out-of-band communications, vulnerabilities, Intel lawsuit Downfall chip vulnerability

CrowdStrike Extends Scope of Managed Cybersecurity Services

CrowdStrike added a slew of capabilities to its managed cybersecurity service, integrated generative AI tools to investigate incidents and announced the acquisition of Bionic, an ASPM platform provider ...
Security Boulevard
Isolate: Network traffic filtering workflow using CrowdStrike, VirusTotal, and FortiGate NGFW.

Implementing MITRE D3FEND for ATT&CK Technique T1110: Brute Force

When account credentials are unknown, attackers may use a brute force attack in order to gain access. This can occur as an early stage of their attack, to gain initial access, or ...
GitLab vulnerability password

CrowdStrike Launches Managed Service Focused on Protecting Credentials

CrowdStrike's new managed service focuses on disrupting cybercriminals who compromise credentials ...
Security Boulevard
Google WhiteSource Log4j Deepfence threat report

Google Recruits Allies to Apply Generative AI to Cybersecurity

At the Google Cloud Security Summit, Google today announced that Broadcom, Crowdstrike, Egnyte, Exabeam, F5, Fortinet, Netskope, Securiti, SentinelOne, Sysdig, Tenable and Thales have all committed to using generative artificial intelligence AI ...
Security Boulevard
Microsoft CrowdStrike HPE edge IBM attack surface ukraine CISA Log4j CISA BlackBerry IoT connected device Bluetooth

CrowdStrike Allies With Google to Secure ChromeOS at the Edge

At the RSA Conference 2023 event, CrowdStrike and Google today announced they are collaborating on an effort to better secure instances of ChromeOS being used at the network edge. It will be ...
Security Boulevard