It’s been a month already since the US Department of Commerce issued its Final Determination with regard to the sales and use of Kaspersky products by US persons. The agency’s decision, if you happen not to be aware of it, in general terms was to ban Kaspersky products – with a few exceptions for informational and educational products and services – from the market. The outcome … [Read more...] about A shield of trust: managing cybersecurity risks through an evidence-based approach
Approach
Charlotte AI’s Multi-AI Approach | CrowdStrike
Over the last year there has been a prevailing sentiment that while AI will not necessarily be replacing humans, humans who use AI will replace those that don’t. This sentiment also applies to the next era of cybersecurity, which has been rapidly unfolding over the last year. Recent breakthroughs in generative AI hold enormous promise for modern defenders. Amid the dual … [Read more...] about Charlotte AI’s Multi-AI Approach | CrowdStrike
Secure data is superior data: A security-first approach to the DoD Data Strategy
From a technical standpoint, starting with secure data is a strategic way to map your architecture and decide on technology investments. If data is not secure, then it is impossible to effectively achieve any other guiding principle of the DoD Data Strategy. Security should serve as the essential foundation for meeting all the other goals, of data being interoperable, … [Read more...] about Secure data is superior data: A security-first approach to the DoD Data Strategy
Revolutionizing telco procurement with the Elasticsearch Platform: A comprehensive approach to unifying licensing and reducing costs
Based on Elastic’s all-inclusive platform approach, organizations can optimize and streamline operations with significant cost savings. Many organizations are focussing on reducing tools, and Elastic is the solution of choice to facilitate and accelerate this movement. Given that telcos often work with a diverse ecosystem of vendors to support various aspects of their … [Read more...] about Revolutionizing telco procurement with the Elasticsearch Platform: A comprehensive approach to unifying licensing and reducing costs
Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
As Threat Actors Continuously Adapt their TTPs in Today's Threat Landscape, So Must You Earlier this year, threat researchers at Cybersixgill released the annual report, The State of the Cybercrime Underground. The research stems from an analysis of Cybersixgill's collected intelligence items throughout 2022, gathered from the deep, dark and clear web. The report examines the … [Read more...] about Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
Going Beyond Infrastructure Observability: Meta’s Approach
What’s the ultimate goal of bringing observability into an organization? Is it just to chase down things when they’re broken and not working? Or can it be used to truly enable developers to innovate faster?That’s a topic I recently discussed with David Ostrovsky, a software engineer at Meta, the parent company of social media networks Facebook and Instagram among others. He was … [Read more...] about Going Beyond Infrastructure Observability: Meta’s Approach
Our Responsible Approach to Governing Artificial Intelligence
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Chief Information Officers and other technology decision makers continuously seek new and better ways to evaluate and manage their investments in innovation – especially the technologies that may … [Read more...] about Our Responsible Approach to Governing Artificial Intelligence
New Approach for Command Line Anomaly Detection
Suspicious command lines differ from common ones in how the executable path looks and the unusual arguments passed to them Bidirectional Encoder Representations from Transformers (BERT) embeddings can successfully be used for feature extraction for command lines Outlier detectors on top of BERT embeddings can detect anomalous command lines without the need for data labeling Our … [Read more...] about New Approach for Command Line Anomaly Detection
Why You Need an Adversary-focused Approach to Stop Cloud Breaches
It should come as little surprise that when enterprise and IT leaders turned their attention to the cloud, so did attackers. Unfortunately, the security capabilities of enterprises have not always kept up with the threat landscape. Poor visibility, management challenges and misconfigurations combine with other security and compliance issues to make protecting cloud environments … [Read more...] about Why You Need an Adversary-focused Approach to Stop Cloud Breaches
How a Generalized Validation Testing Approach Improves Efficiency
In two recent blog posts from the CrowdStrike Software Development Engineers in Test (SDET) team, we explored how end-to-end validation testing and modular testing design could increase the speed and accuracy of the testing lifecycle. In this latest post, we conclude our SDET series with a deep dive on how our generalized validation testing component improves efficiency, … [Read more...] about How a Generalized Validation Testing Approach Improves Efficiency