CrowdStrike Survey Highlights Security Challenges in AI Adoption

CrowdStrike Survey Highlights Security Challenges in AI Adoption

Do the security benefits of generative AI outweigh the harms? Just 39% of security professionals say the rewards outweigh the risks, according to a new report by CrowdStrike. In 2024, CrowdStrike surveyed 1,022 security researchers and practitioners from the U.S., APAC, EMEA, and other regions. The findings revealed that cyber professionals are deeply concerned by the challenges associated with AI. While 64% of respondents have either purchased generative AI tools for work or are researching…

Read More

CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value?

CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value?

CrowdStrike and Wiz are two security providers operating from vastly different positions. On one hand, CrowdStrike has been in the space since 2011 and has solidified itself as an industry leader in endpoint detection and response solutions. Meanwhile, Wiz is a much younger cybersecurity startup founded in 2020 that aims to make a name for itself in the world of cloud security. In this article, we examine how CrowdStrike and Wiz stack against each other…

Read More

CrowdStrike vs Palo Alto 2024: Features, Pricing, and Insights

CrowdStrike vs Palo Alto 2024: Features, Pricing, and Insights

CrowdStrike and Palo Alto Networks are the top providers in the endpoint security industry today. The CrowdStrike Falcon XDR platform has stood as a community favorite for years, bringing high-quality protection, fast investigations, and an easy-to-use console to its service. Meanwhile, Palo Alto’s Cortex XDR delivers a robust service in its own right. It offers ML-powered behavioral analytics and powerful malware analysis sandbox capabilities that keep organizations safe from advanced threats. In this article, I…

Read More

CrowdStrike vs Splunk: Which SIEM Solution Is Right for You

CrowdStrike vs Splunk: Which SIEM Solution Is Right for You

Security information and event management solutions are crucial components in any organization’s cybersecurity infrastructure. The combination of their log monitoring and remediation capabilities provides invaluable protection and allows businesses to address potential threats before they cause any real damage. With this, CrowdStrike and Splunk bring two distinct approaches to their SIEM solutions. On one hand, CrowdStrike’s expertise as an endpoint detection and response leader shows with its Falcon Next-Gen SIEM and unified Falcon platform. Meanwhile,…

Read More

Cybersecurity News Round-Up 2024: Top 10 Biggest Stories

Cybersecurity News Round-Up 2024: Top 10 Biggest Stories

This year has not been quiet for the cybersecurity field. We have seen record-breaking data breaches, huge ransomware payouts, and illuminating studies about the impact of the increasingly complex and ever-evolving threat landscape. As we approach the new year, TechRepublic revisits the biggest cybersecurity stories of 2024. 1.  Midnight Blizzard’s attack on Microsoft In January, Microsoft disclosed that it had been a victim of a nation-state-backed attack beginning in November 2023. The Russian threat actor…

Read More

Top 5 Cyber Security Trends for 2025

Top 5 Cyber Security Trends for 2025

The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold increase in ransomware attempts this year, while research predicts that global cyber attacks in 2024 will surge 105% compared to 2020. There is a dire need for more qualified cyber professionals as generative AI is lowering the barrier to entry for attacks. Unfortunately, cyber skills gaps have been reported in both the U.K. and Australia, with women making up only a quarter…

Read More

Top Vulnerability Management Tools: Reviews & Comparisons 2024

Top Vulnerability Management Tools: Reviews & Comparisons 2024

There are more vulnerabilities around than ever. The Verizon Data Breach Investigations Report highlighted an almost 200% growth in the exploitation of vulnerabilities in 2023. In the first seven months of 2024, new vulnerabilities rose by another 30% compared to the previous year. No wonder vulnerability management tools are becoming a staple of the enterprise cybersecurity arsenal. “Vulnerability management is a core function of cybersecurity,” said Michelle Abraham, research director, Security and Trust at IDC….

Read More

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

Today’s threat landscape includes nation-state actors as well as attackers looking to test their skills or turn a profit. AT ISC2 Security Conference in Las Vegas, CISA advisor and former New York Times cybersecurity journalist Nicole Perlroth took the stage to discuss what has changed over the last 10 years of cyber warfare. Her presentation was the capstone of the conference, held Oct. 13-16. Nation-state attackers look for ‘target-rich, cyber-poor’ victims Perlroth presented a timeline…

Read More

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

A major disruption to Windows PCs in the U.S., U.K., Australia, South Africa and other countries was caused by an error in a CrowdStrike update, the cloud security company announced on Friday. Emergency services, airports and law enforcement reported downtime, which is ongoing. “This is not a security incident or cyberattack,” CrowdStrike said in a statement. Blue Screen of Death widespread due to CrowdStrike outage Affected organizations saw the infamous Blue Screen of Death, the…

Read More

Snowflake Users Targeted for Data Theft and Extortion

Snowflake Users Targeted for Data Theft and Extortion

A new report from Mandiant, part of Google Cloud, reveals that a financially motivated threat actor named UNC5537 collected and exfiltrated data from about 165 organizations’ Snowflake customer instances. Snowflake is a cloud data platform used for storing and analyzing large volumes of data. The threat actor managed to get access to these data by triggering credentials that were previously stolen by infostealer malware or purchased from other cybercriminals. According to Mandiant, the threat actor…

Read More
1 2