Recent Blogs
CrowdStrike Named a Customers’ Choice in 2026 Gartner Peer Insights™ Voice of the Customer for Application Security Posture Management Tools
CrowdStrike has been recognized as a Customers’ Choice in the 2026 Gartner Peer Insights™ Voice of the Customer for Application Security Posture Management (ASPM) Tools report, a distinction based ent[…]
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test
The CrowdStrike Falcon platform has once again delivered a perfect score in the SE Labs October 2025 Enterprise Advanced Security (EDR) Ransomware test: 100% detection accuracy, 100% protection accura[…]
Secure AI with CrowdStrike: Real-World Stories of Protecting AI Workloads and Data
AI is reshaping business at machine speed. From automating claims to improving customer engagement, organizations are embedding AI into core workflows faster than most security teams can track. As AI […]
How Agentic Tool Chain Attacks Threaten AI Agent Security
AI agents are rapidly transforming enterprise operations. Unlike traditional software that follows fixed code paths, AI agents interpret prompts, form plans, select tools, and react to results in a co[…]
LABYRINTH CHOLLIMA Evolves into Three Adversaries
LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core L[…]
CrowdStrike Named a Customers’ Choice in 2026 Gartner® Voice of the Customer for Endpoint Protection Platforms
In today's threat landscape, an effective endpoint protection platform (EPP) is the cornerstone of an organization’s security posture. Built on this foundation, the CrowdStrike Falcon® platform has es[…]
Data Protection Day 2026: From Compliance to Resilience
January 28 marks Data Protection Day, a date rooted in one of the earliest milestones of the digital age: the anniversary of the 1981 signing of Convention 108, the first legally binding international[…]
Small Devices, Big Risk: USB Drives Threaten Enterprise Security
As cloud applications, SaaS platforms, and GenAI tools shape most modern workflows, one physical channel presents an ongoing risk: removable media. USB drives, external devices, and other portable sto[…]
The Architecture of Agentic Defense: Inside the Falcon Platform
The architectural divide in cybersecurity is no longer theoretical. It's operational. Adversaries are deploying AI-accelerated attacks and moving laterally across domains faster than human analysts ca[…]
CrowdStrike to Acquire Seraphic to Secure Work in Any Browser
I’m delighted to announce CrowdStrike’s intent to acquire Seraphic, the leader in browser runtime security. With this acquisition, we will extend the power of the CrowdStrike Falcon® platform into the[…]





![Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO]](png/video-attck2-1fcac.png?wid=530&hei=349&fmt=png-alpha&qlt=95,0&resMode=sharp2&op_usm=3.0,0.3,2,0)
![Qatar’s Commercial Bank Chooses CrowdStrike Falcon®: A Partnership Based on Trust [VIDEO]](png/edward-gonam-qatar-blog2-1fcac.png?wid=530&hei=349&fmt=png-alpha&qlt=95,0&resMode=sharp2&op_usm=3.0,0.3,2,0)