CINXE.COM
Fal.Con 2024 - Resilient by Design | CrowdStrike
<!DOCTYPE HTML> <html lang="en-US" hrefLang="en-US" data-wcmmode-disabled="true"> <head> <meta charset="UTF-8"/> <title>Fal.Con 2024 - Resilient by Design | CrowdStrike</title> <meta name="description" content="George Kurtz unveils the "Resilient by Design" framework introduced at Fal.Con 2024 and its role in CrowdStrike's future. Learn more!"/> <meta name="template" content="crowdstrike-blog-detail-page-v2"/> <meta name="MobileOptimized" content="width"/> <meta name="HandheldFriendly" content="true"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta http-equiv="x-ua-compatible" content="ie=edge"/> <meta property="twitter:card" content="summary"/> <meta name="robots" content="index, follow"/> <script type="module"> window.RUM_BASE = window.origin; import { sampleRUM } from '/.rum/@adobe/helix-rum-js@%5E2/src/index.js'; window.hlx = window.hlx || {}; window.hlx.sampleRUM = sampleRUM; sampleRUM(); </script><link rel="canonical" href="https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/"/> <link rel="alternate" href="https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/" hreflang="en_US"/> <link rel="alternate" href="https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/" hreflang="x-default"/> <meta name="og:title" content="Fal.Con 2024 - Resilient by Design | CrowdStrike"/> <meta name="og:url" content="https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/"/> <meta name="og:type" content="website"/> <meta name="og:site_name" content="CrowdStrike.com"/> <meta name="og:image" content="https://assets.crowdstrike.com/is/image/crowdstrikeinc/WebShareDefaultImage"/> <meta name="og:description" content="George Kurtz unveils the "Resilient by Design" framework introduced at Fal.Con 2024 and its role in CrowdStrike's future. Learn more!"/> <meta name="og:locale" content="en-US"/> <meta name="article:modified_time" content="2024-10-01T23:48:54"/> <meta name="twitter:title" content="Fal.Con 2024 - Resilient by Design | CrowdStrike"/> <meta name="twitter:description" content="George Kurtz unveils the "Resilient by Design" framework introduced at Fal.Con 2024 and its role in CrowdStrike's future. Learn more!"/> <meta name="twitter:image" content="https://assets.crowdstrike.com/is/image/crowdstrikeinc/WebShareDefaultImage"/> <!-- OneTrust Cookies Consent Notice start for default --> <script type="text/javascript" src="https://cdn.cookielaw.org/consent/bee15b7c-b632-450e-9003-9c8b60b3b978/OtAutoBlock.js" data-cfasync="false"></script> <script src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-document-language="true" type="text/javascript" charset="UTF-8" data-domain-script="bee15b7c-b632-450e-9003-9c8b60b3b978" data-cfasync="false"> </script> <script type="text/javascript" data-cfasync="false"> function OptanonWrapper() { } </script> <!-- OneTrust Cookies Consent Notice end for default --> <script type="text/javascript" data-cfasync="false"> !function(e,a,n,t){var i=e.head;if(i){ if (a) return; var o=e.createElement("style"); o.id="alloy-prehiding",o.innerText=n,i.appendChild(o),setTimeout(function(){o.parentNode&&o.parentNode.removeChild(o)},t)}} (document, document.location.href.indexOf("adobe_authoring_enabled") !== -1, "[data-target-location='true'] { opacity: 0 !important}", 3000); </script> <script type="text/javascript" src="//assets.adobedtm.com/d72cd986aea0/f7467a554824/launch-d9bfd4283ab8.min.js" async data-cfasync="false"></script> <!-- Initialize Analytics JS --> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-global-analytics.lc-0dd91d958785c30dd4fd53534eada6ac-lc.min.js"></script> <!-- load base css --> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-grid.lc-d75b4ada966a12a0acc4f4483174f716-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-base.lc-61e1f474009a3adcff6cc95dde2309a3-lc.min.css" type="text/css"> <!-- Initialize Language Direction --> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-language.lc-4418ee9ad99afc3c80f14f47d372a699-lc.min.js"></script> <!-- TODO - Determine how we can preload this --> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-fonts.lc-475459b8ddb225de7aad82eaf0d465c8-lc.min.css" type="text/css"> <script src="/etc.clientlibs/clientlibs/granite/jquery.lc-f9e8e8c279baf6a1a278042afe4f395a-lc.min.js"></script> <script src="/etc.clientlibs/clientlibs/granite/utils.lc-899004cc02c33efc1f6694b1aee587fd-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-dependencies.lc-bb1dbdd53e32240429436d11ecb5f036-lc.min.js"></script> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-dependencies.lc-2929dd9d69a653da2cf8fe429017e6b6-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-common.lc-d0bf17d6d56f96c686f141239e19deec-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-wp-fonts.lc-9d825acd2674ee2606e257c1733f21ed-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-wp.lc-2487188ada5a39be760c58a1cf767759-lc.min.css" type="text/css"> <link rel="stylesheet" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-addsearch.lc-de23ed8a23f12eddd605ddc6e0d4a254-lc.min.css" type="text/css"> <link rel="icon" href="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-common/resources/favicon.ico"/> <!-- SEO SCHEMA --> </head> <body class="page_blogs page basicpage" data-disable-alertbar="false" data-alertbar-xf="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/header/header-elements/alert/master" data-start-gradient="#EC0000" data-end-gradient="#1F60A2" data-product-promo-enabled="true"> <!-- <script async="async" type="text/javascript" src="https://addsearch.com/js/?key=7737a29b854de71521b1cd72c4118cfc"></script> --> <div class="cmp-addsearch"> <input type="hidden" name="as_key" value="7737a29b854de71521b1cd72c4118cfc"/> <input type="hidden" name="as_domain" value="addsearch.com"/> </div> <div style="display: none;"> </div> <div class="root responsivegrid"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="experiencefragment aem-GridColumn aem-GridColumn--default--12"> <div id="experiencefragment-a7502ee130" class="cmp-experiencefragment cmp-experiencefragment--header" data-target-location="false"> <div id="container-f522ffdda3" class="cmp-container" data-cmp-is="responsive-grid-container"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="header aem-GridColumn aem-GridColumn--default--12"><div class="cmp-wp-header blog_main_navigation"> <div data-selector="promoInsert" data-id="mainPromoBar"></div> <div data-selector="promoInsert" data-id="secondaryPromoBar"></div> <div id="blogNavInsertLocation"> <div class="cmp-wp-sociallinks-header"> <div class="blog_main_navigation_top" id="sociallinks-en-us-10-03-2024"> <div class="container"> <div class="row"> <div class="col-12"> <ul class="d-flex justify-content-end align-items-center"> <li id="searchBlog" class="mx-2"> <div data-cmp-is="add-search" id="search-header"> <!-- Open Modal Button --> <button class="search_btn fa-solid fa-magnifying-glass" aria-label="Click to open Search menu"> </button> <!-- Modal Popup --> <div class="modal-addsearch"> <span class="modal-addsearch__close"></span> <div class="modal-addsearch__content"> <div class="widget widget--addsearch"> <div class="widget__searchfield" id="searchfield"></div> <div class="modal-addsearch__scroll-box"> <div class="widget__results" id="results"></div> <div class="widget__load-more" id="loadMore"></div> </div> </div> </div> </div> </div> </li> <li class="mx-2"> <a href="https://www.twitter.com/CrowdStrike" target="_blank" aria-label="twitter"> <span class="fa-brands fa-x-twitter"></span> </a> </li> <li class="mx-2"> <a href="https://www.facebook.com/CrowdStrike" target="_blank" aria-label="facebook"> <span class="fa-brands fa-facebook"></span> </a> </li> <li class="mx-2"> <a href="https://www.linkedin.com/company/crowdstrike" target="_blank" aria-label="linkedin"> <span class="fa-brands fa-linkedin"></span> </a> </li> <li class="mx-2"> <a href="https://www.youtube.com/user/CrowdStrike" target="_blank" aria-label="youtube"> <span class="fa-brands fa-youtube"></span> </a> </li> <li class="ml-2"> <a href="mailto:mailto:info@crowdstrike.com" target="_blank" aria-label="envelope"> <span class="fa fa-envelope"></span> </a> </li> </ul> </div> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="blog_main_navigation_bottom"> <div class="container" id="navigation-en-us-10-03-2024"> <div class="row"> <div class="col-12 d-flex align-items-center justify-content-between"> <div class="blog_main_navigation_bottom_site_logo d-flex align-items-center"> <a class="cmp-wp-logo crowdstrike_logo" data-target-location="false"> <img src="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/blogs/header/header/master/_jcr_content/root/responsivegrid/header/navigation/logo.coreimg.svg/1727967127650/redlogocs.svg" alt="Crowdstrike"/> </a> <a class="blog_logo" href="/en-us/blog/" title="BLOG">BLOG</a> <div style="display: none;"> </div> </div> <ul class="blog_navigation_right" data-target-location="false"> <li class="blog_navigation_right_li_tab"> <a href="/en-us/blog/featured-articles/" class="blog_navigation_right_li_header">Featured</a> <ul class="horizontal_dropdown"> <li> <a href="/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CustomerStory-Mastronardi" alt="Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike</div> <div class="date">Feb 14, 2025</div> </div> </a> </li> <li> <a href="/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Agentic-AI" alt="CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage</div> <div class="date">Feb 13, 2025</div> </div> </a> </li> <li> <a href="/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-NG-SIEM-DataExfiltration" alt="Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM</div> <div class="date">Feb 13, 2025</div> </div> </a> </li> <li> <a href="/en-us/blog/how-adversary-taxonomies-strengthen-global-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/how-adversary-taxonomies-strengthen-global-security.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Adversary-Naming" alt="Naming Names: How Adversary Taxonomies Strengthen Global Security" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Naming Names: How Adversary Taxonomies Strengthen Global Security</div> <div class="date">Feb 12, 2025</div> </div> </a> </li> </ul> </li> <li class="blog_navigation_right_li_tab"> <a href="/en-us/blog/recent-articles/" class="blog_navigation_right_li_header" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/recent-articles.html">Recent</a> <ul class="horizontal_dropdown"> <li> <a href="/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CustomerStory-Mastronardi" alt="Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike</div> <div class="date">Feb 14, 2025</div> </div> </a> </li> <li> <a href="/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Agentic-AI" alt="CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage</div> <div class="date">Feb 13, 2025</div> </div> </a> </li> <li> <a href="/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-NG-SIEM-DataExfiltration" alt="Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM</div> <div class="date">Feb 13, 2025</div> </div> </a> </li> <li> <a href="/en-us/blog/how-adversary-taxonomies-strengthen-global-security/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/how-adversary-taxonomies-strengthen-global-security.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Adversary-Naming" alt="Naming Names: How Adversary Taxonomies Strengthen Global Security" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Naming Names: How Adversary Taxonomies Strengthen Global Security</div> <div class="date">Feb 12, 2025</div> </div> </a> </li> </ul> </li> <li class="blog_navigation_right_li_tab"> <a href="/en-us/blog/videos/" class="blog_navigation_right_li_header" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/videos.html">Video</a> <ul class="horizontal_dropdown"> <li> <a href="/en-us/blog/video-highlights-the-4-key-steps-to-successful-incident-response/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/video-highlights-the-4-key-steps-to-successful-incident-response.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/IR-Video-Blog-1" alt="Video Highlights the 4 Key Steps to Successful Incident Response" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Video Highlights the 4 Key Steps to Successful Incident Response</div> <div class="date">Dec 02, 2019</div> </div> </a> </li> <li> <a href="/en-us/blog/helping-non-security-stakeholders-understand-attck-in-10-minutes-or-less/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/helping-non-security-stakeholders-understand-attck-in-10-minutes-or-less.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/video-ATTCK2-1" alt="Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO]" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO]</div> <div class="date">Feb 21, 2019</div> </div> </a> </li> <li> <a href="/en-us/blog/qatars-commercial-bank-chooses-crowdstrike-falcon-a-partnership-based-on-trust/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/qatars-commercial-bank-chooses-crowdstrike-falcon-a-partnership-based-on-trust.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Edward-Gonam-Qatar-Blog2-1" alt="Qatar’s Commercial Bank Chooses CrowdStrike Falcon®: A Partnership Based on Trust [VIDEO]" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Qatar’s Commercial Bank Chooses CrowdStrike Falcon®: A Partnership Based on Trust [VIDEO]</div> <div class="date">Aug 20, 2018</div> </div> </a> </li> <li> <a href="/en-us/blog/how-crowdstrike-integrates-threat-intelligence-with-endpoint-protection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/how-crowdstrike-integrates-threat-intelligence-with-endpoint-protection.html"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/GK-Blog_Images-1" alt="Endpoint Protection and Threat Intelligence: The Way Forward [VIDEO]" data-uw-rm-alt-original="" data-uw-rm-alt="CT"/></div> <div class="d-flex flex-column"> <div class="title">Endpoint Protection and Threat Intelligence: The Way Forward [VIDEO]</div> <div class="date">Aug 05, 2018</div> </div> </a> </li> </ul> </li> <li class="blog_navigation_right_li_tab"> <a href="/en-us/blog/categories-overview/" class="blog_navigation_right_li_header" data-link-tracked="true" data-uw-rm-brl="PR">Category</a> <ul id="blog-navigation-category-dropdown" class="vertical_dropdown"> <li class="vertical_dropdown_element cloud-security active"> <a href="/en-us/blog/category.cloud-security/"> <div class="title">Cloud & Application Security</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container cloud-security"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogIcon-test-image-1.svg"/> <dt class="d-flex align-items-center cloud-security">Cloud & Application Security </dt> </div> <dd> <a href="/en-us/blog/istio-configuration-finding-improve-kubernetes-security/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Kubernetes-AI" alt="Improving Kubernetes Security: Lessons from an Istio Configuration Finding"/> </div> <div class="title">Improving Kubernetes Security: Lessons from an Istio Configuration Finding</div> </a> <div class="date">02/06/25 </div> </dd> <dd> <a href="/en-us/blog/crowdstrike-extends-powerful-falcon-platform-capabilities-red-hat-openshift/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-RedHat" alt="CrowdStrike Extends Powerful Falcon Platform Capabilities into Red Hat OpenShift "/> </div> <div class="title">CrowdStrike Extends Powerful Falcon Platform Capabilities into Red Hat OpenShift </div> </a> <div class="date">01/28/25 </div> </dd> <dd> <a href="/en-us/blog/critical-evolution-of-cdr/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-ModernCDR" alt="The Critical Evolution of Cloud Detection and Response"/> </div> <div class="title">The Critical Evolution of Cloud Detection and Response</div> </a> <div class="date">01/15/25 </div> </dd> <dd> <a href="/en-us/blog/enhanced-security-with-registry-scanning-hybrid-cloud/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_16_EnhancedSecurity_RegistryScanning" alt="CrowdStrike Strengthens Container Security with Registry Scanning for Hybrid Clouds"/> </div> <div class="title">CrowdStrike Strengthens Container Security with Registry Scanning for Hybrid Clouds</div> </a> <div class="date">01/08/25 </div> </dd> </dl> </li> <li class="vertical_dropdown_element counter-adversary-operations "> <a href="/en-us/blog/category.counter-adversary-operations/"> <div class="title">Counter Adversary Operations</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container counter-adversary-operations"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Counter-Adversary-Operations.svg"/> <dt class="d-flex align-items-center counter-adversary-operations">Counter Adversary Operations </dt> </div> <dd> <a href="/en-us/blog/how-adversary-taxonomies-strengthen-global-security/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Adversary-Naming" alt="Naming Names: How Adversary Taxonomies Strengthen Global Security"/> </div> <div class="title">Naming Names: How Adversary Taxonomies Strengthen Global Security</div> </a> <div class="date">02/12/25 </div> </dd> <dd> <a href="/en-us/blog/crowdstrike-launches-insider-risk-services/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_26_InsiderRiskServices" alt="CrowdStrike Insider Risk Services Defend Against the Threats Within"/> </div> <div class="title">CrowdStrike Insider Risk Services Defend Against the Threats Within</div> </a> <div class="date">01/15/25 </div> </dd> <dd> <a href="/en-us/blog/recruitment-phishing-scam-imitates-crowdstrike-hiring-process/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1121_05_Scheming_URLS" alt="Recruitment Phishing Scam Imitates CrowdStrike Hiring Process"/> </div> <div class="title">Recruitment Phishing Scam Imitates CrowdStrike Hiring Process</div> </a> <div class="date">01/08/25 </div> </dd> <dd> <a href="/en-us/blog/latam-ecrime-malware-evolution-2024/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_10_LatinAmericaneCrime" alt="A Look Back: The Evolution of Latin American eCrime Malware in 2024"/> </div> <div class="title">A Look Back: The Evolution of Latin American eCrime Malware in 2024</div> </a> <div class="date">12/16/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element endpoint-protection "> <a href="/en-us/blog/category.endpoint-protection/"> <div class="title">Endpoint Security & XDR</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container endpoint-protection"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Endpoint-Security-And-XDR.svg"/> <dt class="d-flex align-items-center endpoint-protection">Endpoint Security & XDR </dt> </div> <dd> <a href="/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CustomerStory-Mastronardi" alt="Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike"/> </div> <div class="title">Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike</div> </a> <div class="date">02/14/25 </div> </dd> <dd> <a href="/en-us/blog/university-of-sunderland-proactive-defense/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CaseStudy-University-Sunderland" alt="University of Sunderland Goes from Ransomware Recovery to Proactive Defense with CrowdStrike"/> </div> <div class="title">University of Sunderland Goes from Ransomware Recovery to Proactive Defense with CrowdStrike</div> </a> <div class="date">02/04/25 </div> </dd> <dd> <a href="/en-us/blog/crowdstrike-falcon-earns-perfect-score-in-se-labs-ransomware-evaluation/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-trophy" alt="CrowdStrike Falcon Platform Achieves Perfect Score in SE Labs’ Most Comprehensive Ransomware Evaluation"/> </div> <div class="title">CrowdStrike Falcon Platform Achieves Perfect Score in SE Labs’ Most Comprehensive Ransomware Evaluation</div> </a> <div class="date">01/28/25 </div> </dd> <dd> <a href="/en-us/blog/modern-security-for-legacy-environments/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_25_FalconforLegacySystems" alt="CrowdStrike Falcon for Legacy Systems: Modern Security for Legacy Environments"/> </div> <div class="title">CrowdStrike Falcon for Legacy Systems: Modern Security for Legacy Environments</div> </a> <div class="date">01/15/25 </div> </dd> </dl> </li> <li class="vertical_dropdown_element engineering-and-technology "> <a href="/en-us/blog/category.engineering-and-technology/"> <div class="title">Engineering & Tech</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container engineering-and-technology"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Engineering-Tech.svg"/> <dt class="d-flex align-items-center engineering-and-technology">Engineering & Tech </dt> </div> <dd> <a href="/en-us/blog/leveraging-crowdstrike-falcon-against-attacks-targeting-okta/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Identity-NGS" alt="Leveraging CrowdStrike Falcon Against Attacks Targeting Okta Environments"/> </div> <div class="title">Leveraging CrowdStrike Falcon Against Attacks Targeting Okta Environments</div> </a> <div class="date">01/21/25 </div> </dd> <dd> <a href="/en-us/blog/tech-analysis-channel-file-may-contain-null-bytes/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/ResourceCards-04" alt="Tech Analysis: Channel File May Contain Null Bytes"/> </div> <div class="title">Tech Analysis: Channel File May Contain Null Bytes</div> </a> <div class="date">07/24/24 </div> </dd> <dd> <a href="/en-us/blog/embersim-large-databank-for-similarity-research-in-cybersecurity/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Falcon-Script-Control-Blog-1-1024x674" alt="EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"/> </div> <div class="title">EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis</div> </a> <div class="date">06/06/24 </div> </dd> <dd> <a href="/en-us/blog/esxi-ransomware-detection-falcon-next-gen-siem/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/XXXX_Falcon-LogScale-So-Fast_Blog_1060x698" alt="CrowdStrike Falcon Next-Gen SIEM Unveils Advanced Detection of Ransomware Targeting VMware ESXi Environments"/> </div> <div class="title">CrowdStrike Falcon Next-Gen SIEM Unveils Advanced Detection of Ransomware Targeting VMware ESXi Environments</div> </a> <div class="date">04/15/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element executive-viewpoint "> <a href="/en-us/blog/category.executive-viewpoint/"> <div class="title">Executive Viewpoint</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container executive-viewpoint"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Executive-Viewpoint.svg"/> <dt class="d-flex align-items-center executive-viewpoint">Executive Viewpoint </dt> </div> <dd> <a href="/en-us/blog/csu-fast-track-fuels-cybersecurity-training/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CSU-FastTrack" alt="CrowdStrike University Fast Track Fuels Cybersecurity Training"/> </div> <div class="title">CrowdStrike University Fast Track Fuels Cybersecurity Training</div> </a> <div class="date">02/10/25 </div> </dd> <dd> <a href="/en-us/blog/crowdstrike-launches-ai-red-team-services/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-Red-Team" alt="CrowdStrike Launches AI Red Team Services to Secure AI Innovation"/> </div> <div class="title">CrowdStrike Launches AI Red Team Services to Secure AI Innovation</div> </a> <div class="date">11/07/24 </div> </dd> <dd> <a href="/en-us/blog/crowdstrike-acquires-adaptive-shield-and-integrates-saas-protection/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/alpine-blog-social" alt="CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management"/> </div> <div class="title">CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management</div> </a> <div class="date">11/06/24 </div> </dd> <dd> <a href="/en-us/blog/fal-con-europe-2024/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/blog-1024_02_Fal.Con-Europe_01" alt="Fal.Con Europe: Bringing the Power of the Crowd to Amsterdam"/> </div> <div class="title">Fal.Con Europe: Bringing the Power of the Crowd to Amsterdam</div> </a> <div class="date">10/14/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element from-the-front-lines "> <a href="/en-us/blog/category.from-the-front-lines/"> <div class="title">From The Front Lines</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container from-the-front-lines"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/From-The-Front-Lines.svg"/> <dt class="d-flex align-items-center from-the-front-lines">From The Front Lines </dt> </div> <dd> <a href="/en-us/blog/crowdstrike-named-leader-for-cybersecurity-incident-response-services-q2-2024/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/xdr-wave-blog-image-1068x698-headline-3-1024x669" alt="CrowdStrike Named a Leader with “Bold Vision” in 2024 Forrester Wave for Cybersecurity Incident Response Services"/> </div> <div class="title">CrowdStrike Named a Leader with “Bold Vision” in 2024 Forrester Wave for Cybersecurity Incident Response Services</div> </a> <div class="date">06/10/24 </div> </dd> <dd> <a href="/en-us/blog/how-to-defend-employees-data-as-social-engineering-evolves/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog_0520_08-1" alt="How to Defend Employees and Data as Social Engineering Evolves"/> </div> <div class="title">How to Defend Employees and Data as Social Engineering Evolves</div> </a> <div class="date">03/22/24 </div> </dd> <dd> <a href="/en-us/blog/anatomy-of-alpha-spider-ransomware/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/SPIDER-adversary-blog-main-image" alt="The Anatomy of an ALPHA SPIDER Ransomware Attack"/> </div> <div class="title">The Anatomy of an ALPHA SPIDER Ransomware Attack</div> </a> <div class="date">02/29/24 </div> </dd> <dd> <a href="/en-us/blog/crowdstrike-incident-response-executive-prep-checklist/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/0122_03_IR_Tracker_for_DFIR_Community" alt="CrowdStrike Services Offers Incident Response Executive Preparation Checklist"/> </div> <div class="title">CrowdStrike Services Offers Incident Response Executive Preparation Checklist</div> </a> <div class="date">10/23/23 </div> </dd> </dl> </li> <li class="vertical_dropdown_element identity-protection "> <a href="/en-us/blog/category.identity-protection/"> <div class="title">Identity Protection</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container identity-protection"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Identity-Protection.svg"/> <dt class="d-flex align-items-center identity-protection">Identity Protection </dt> </div> <dd> <a href="/en-us/blog/inside-crowdstrike-ml-powered-ldap-reconnaissance-detections/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-LDAP" alt="Caught in the Act: CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections"/> </div> <div class="title">Caught in the Act: CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections</div> </a> <div class="date">02/04/25 </div> </dd> <dd> <a href="/en-us/blog/falcon-identity-protection-forrester-tei-study/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/BLog-ForresterTEI-Report" alt="CrowdStrike Falcon Identity Protection Delivered $1.26M in Total Benefits Over Three Years"/> </div> <div class="title">CrowdStrike Falcon Identity Protection Delivered $1.26M in Total Benefits Over Three Years</div> </a> <div class="date">01/16/25 </div> </dd> <dd> <a href="/en-us/blog/adaptive-shield-crowdstrike-company-leads-2024-frost-radar-sspm-leadership-report/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-image-Frost-SSPM" alt="Adaptive Shield, a CrowdStrike Company, Leads in 2024 Frost Radar SSPM Leadership Report"/> </div> <div class="title">Adaptive Shield, a CrowdStrike Company, Leads in 2024 Frost Radar SSPM Leadership Report</div> </a> <div class="date">12/09/24 </div> </dd> <dd> <a href="/en-us/blog/announcing-protection-aws-iam-identity-center/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_01_Identity%20Protection" alt="CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center "/> </div> <div class="title">CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center </div> </a> <div class="date">12/04/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element observability-and-log-management "> <a href="/en-us/blog/category.observability-and-log-management/"> <div class="title">Next-Gen SIEM & Log Management</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container observability-and-log-management"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Nest-Gen-SIEM-and-LOG-Management.svg"/> <dt class="d-flex align-items-center observability-and-log-management">Next-Gen SIEM & Log Management </dt> </div> <dd> <a href="/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-NG-SIEM-DataExfiltration" alt="Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM"/> </div> <div class="title">Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM</div> </a> <div class="date">02/13/25 </div> </dd> <dd> <a href="/en-us/blog/first-year-of-falcon-next-gen-siem-transforming-soc/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_17_Next-GenSIEM" alt="CrowdStrike Falcon Next-Gen SIEM’s First Year Transforming the SOC"/> </div> <div class="title">CrowdStrike Falcon Next-Gen SIEM’s First Year Transforming the SOC</div> </a> <div class="date">12/23/24 </div> </dd> <dd> <a href="/en-us/blog/cribl-partnership-crowdstream-expansion/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/0324_02_Next-Gen_SIEM" alt="CrowdStrike and Cribl Expand Partnership with CrowdStream for Next-Gen SIEM"/> </div> <div class="title">CrowdStrike and Cribl Expand Partnership with CrowdStream for Next-Gen SIEM</div> </a> <div class="date">11/21/24 </div> </dd> <dd> <a href="/en-us/blog/building-custom-apps-with-crowdstrike-falcon-foundry/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog_1060x698-new-us" alt="Falcon Foundry: Build Custom Apps to Solve Tough Security Challenges"/> </div> <div class="title">Falcon Foundry: Build Custom Apps to Solve Tough Security Challenges</div> </a> <div class="date">10/22/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element public-sector "> <a href="/en-us/blog/category.public-sector/"> <div class="title">Public Sector</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container public-sector"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogicon-test-4.png"/> <dt class="d-flex align-items-center public-sector">Public Sector </dt> </div> <dd> <a href="/en-us/blog/govcloud-1-authorization-for-crowdstrike-modules/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_22_ZeroTrust" alt="Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals"/> </div> <div class="title">Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals</div> </a> <div class="date">01/16/25 </div> </dd> <dd> <a href="/en-us/blog/crowdstrike-statement-bloomberg/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Falcon-on-white" alt="CrowdStrike Statement on Bloomberg’s October 25, 2024 Story"/> </div> <div class="title">CrowdStrike Statement on Bloomberg’s October 25, 2024 Story</div> </a> <div class="date">10/25/24 </div> </dd> <dd> <a href="/en-us/blog/next-steps-for-ecosystem-level-cybersecurity/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/0522_11_Falcon_ID-Threat-Protection_Fed-State-Local_Blog_1060x698" alt="Achieving Ecosystem-level Cybersecurity: A U.S. Policy Perspective"/> </div> <div class="title">Achieving Ecosystem-level Cybersecurity: A U.S. Policy Perspective</div> </a> <div class="date">06/11/24 </div> </dd> <dd> <a href="/en-us/blog/sec_readiness/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog_1060x698-66-us" alt="CrowdStrike Launches SEC Readiness Services to Prepare Boardrooms for New Regulations"/> </div> <div class="title">CrowdStrike Launches SEC Readiness Services to Prepare Boardrooms for New Regulations</div> </a> <div class="date">03/14/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element exposure-management "> <a href="/en-us/blog/category.exposure-management/"> <div class="title">Exposure Management</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container exposure-management"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/BlogIcon-test-image-2.svg"/> <dt class="d-flex align-items-center exposure-management">Exposure Management </dt> </div> <dd> <a href="/en-us/blog/patch-tuesday-analysis-february-2025/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-PT-2025" alt="February 2025 Patch Tuesday: Four Zero-Days and Three Critical Vulnerabilities Among 67 CVEs"/> </div> <div class="title">February 2025 Patch Tuesday: Four Zero-Days and Three Critical Vulnerabilities Among 67 CVEs</div> </a> <div class="date">02/11/25 </div> </dd> <dd> <a href="/en-us/blog/patch-tuesday-analysis-january-2025/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-PT-new" alt="January 2025 Patch Tuesday: 10 Critical Vulnerabilities and Eight Zero-Days Among 159 CVEs "/> </div> <div class="title">January 2025 Patch Tuesday: 10 Critical Vulnerabilities and Eight Zero-Days Among 159 CVEs </div> </a> <div class="date">01/14/25 </div> </dd> <dd> <a href="/en-us/blog/assess-misconfigurations-at-scale-with-fem/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_12_AssessingMisconfigurations" alt="Assessing Misconfigurations at Scale with Falcon Exposure Management"/> </div> <div class="title">Assessing Misconfigurations at Scale with Falcon Exposure Management</div> </a> <div class="date">12/19/24 </div> </dd> <dd> <a href="/en-us/blog/patch-tuesday-analysis-december-2024/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/patch-tuesday-blog-1" alt="December 2024 Patch Tuesday: 16 Critical and One Zero-Day Among 71 Vulnerabilities "/> </div> <div class="title">December 2024 Patch Tuesday: 16 Critical and One Zero-Day Among 71 Vulnerabilities </div> </a> <div class="date">12/10/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element small-business "> <a href="/en-us/blog/category.small-business/"> <div class="title">Small Business</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container small-business"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogicon-test5.svg"/> <dt class="d-flex align-items-center small-business">Small Business </dt> </div> <dd> <a href="/en-us/blog/one-year-of-falcon-go-transforming-cybersecurity/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_01_SMBs" alt="One Year of Falcon Go: Transforming Cybersecurity for Small Businesses"/> </div> <div class="title">One Year of Falcon Go: Transforming Cybersecurity for Small Businesses</div> </a> <div class="date">12/03/24 </div> </dd> <dd> <a href="/en-us/blog/smb-security-seamless-mobile-protection/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/blog-1024_03_SMB-Big-Protection" alt="CrowdStrike Strengthens SMB Security with Seamless Mobile Protection"/> </div> <div class="title">CrowdStrike Strengthens SMB Security with Seamless Mobile Protection</div> </a> <div class="date">11/21/24 </div> </dd> <dd> <a href="/en-us/blog/four-steps-to-increase-cyber-resilience/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/blog-1024_03_SMB-Big-Protection" alt="Small Business, Big Defense: Four Pillars of an Effective Cybersecurity Awareness Program"/> </div> <div class="title">Small Business, Big Defense: Four Pillars of an Effective Cybersecurity Awareness Program</div> </a> <div class="date">10/14/24 </div> </dd> <dd> <a href="/en-us/blog/3-ways-small-businesses-big-strides-cybersecurity/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/1022_08_Small-Business-Rethink-Cybersecurity_Blog_1060x698" alt="3 Ways Small Businesses Can Make Big Strides in Cybersecurity"/> </div> <div class="title">3 Ways Small Businesses Can Make Big Strides in Cybersecurity</div> </a> <div class="date">06/14/24 </div> </dd> </dl> </li> <li class="vertical_dropdown_element ai-machine-learning "> <a href="/en-us/blog/category.ai-machine-learning/"> <div class="title">AI & Machine Learning</div> </a> <dl class="vertical_dropdown_list"> <div class="category-icon-container ai-machine-learning"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogicon-test-3.svg"/> <dt class="d-flex align-items-center ai-machine-learning">AI & Machine Learning </dt> </div> <dd> <a href="/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Agentic-AI" alt="CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage"/> </div> <div class="title">CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage</div> </a> <div class="date">02/13/25 </div> </dd> <dd> <a href="/en-us/blog/the-evolving-role-of-ai-in-data-protection/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-DataProtection" alt="The Evolving Role of AI in Data Protection "/> </div> <div class="title">The Evolving Role of AI in Data Protection </div> </a> <div class="date">01/29/25 </div> </dd> <dd> <a href="/en-us/blog/contrastive-learning-enhance-malware-threat-detection/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-ML-Brain" alt="CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats"/> </div> <div class="title">CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats</div> </a> <div class="date">01/22/25 </div> </dd> <dd> <a href="/en-us/blog/research-results-state-of-ai-cybersecurity-survey/"> <div class="image"><img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Ai-Survey" alt="80% of Cybersecurity Leaders Prefer Platform-Delivered GenAI for Stronger Defense "/> </div> <div class="title">80% of Cybersecurity Leaders Prefer Platform-Delivered GenAI for Stronger Defense </div> </a> <div class="date">12/17/24 </div> </dd> </dl> </li> </ul> </li> <li class="blog_navigation_right_li_tab"> <a href="https://www.crowdstrike.com/products/trials/try-falcon-prevent" class="blog_navigation_right_li_header userway-s7-active">Start Free Trial</a> </li> </ul> <div id="blogMobileMenuBtn" class="mobile_nav_btn red"><span></span></div> </div> </div> </div> <div class="blog_navigation_mobile"> <div class="container"> <div class="row"> <div class="col-12"> <ul> <li> <a href="/en-us/blog/featured-articles/">Featured</a> </li> <li> <a href="/en-us/blog/recent-articles/">Recent</a> </li> <li> <a href="/en-us/blog/videos/">Video</a> </li> <li> <a href="/en-us/blog/categories-overview/">Category</a> </li> <li> <a href="https://www.crowdstrike.com/products/trials/try-falcon-prevent">Start Free Trial</a> </li> </ul> </div> </div> </div> </div> <div style="display: none;"> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="cmp-wp-modal modal_insert_location aem-GridColumn aem-GridColumn--default--12"> <div data-id="wistia_player_embed"></div> <div id="subscribe" class="container"> <div class="row"> <div class="col-lg-12"> <div id="modal-inner-mask" class="modal_mask"> <div class="close_button"><i data-id="modal-close" class="fa fa-close"></i></div> <div class="modal-insert-wrapper"> <div id="modal-insert" class="modal_content"> </div> </div> </div> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="container-wp container-wp--centered-blog container-wp--grid container-wp--num-col-2-right-sidebar-blog container-wp--num-col-2-right-sidebar-blog-desktop aem-GridColumn aem-GridColumn--default--12"> <div id="main-container" class="cmp-container-wp" data-cmp-is="responsive-grid-container" data-padding-top="128"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="container-wp container-wp--main-content-blog aem-GridColumn aem-GridColumn--default--12"> <div id="container-c9ab7dd884" class="cmp-container-wp" data-cmp-is="responsive-grid-container" data-padding-left="16" data-padding-right="16"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="headline aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-wp-headline" id="headline-en-us-04-19-2024"> <h1>Recognizing the Resilience of the CrowdStrike Community</h1> <div class="publish_info"> <p>September 25, 2024</p> <span>|</span> <a href="/en-us/blog/author.george-kurtz/" title="Posts by George Kurtz" rel="author"> George Kurtz</a> <span>|</span> <a href="/en-us/blog/category.executive-viewpoint/" title="Executive Viewpoint">Executive Viewpoint</a> </div> <div class="post_image"> <img width="1060" height="698" src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/0924_04_Post-Fal.Con_Resilient-by-Design_03B" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="/content/dam/crowdstrike/www/en-us/wp/2024/09/0924_04_Post-Fal.Con_Resilient-by-Design_03B.jpg 1060w,https://assets.crowdstrike.com/is/image/crowdstrikeinc/0924_04_Post-Fal.Con_Resilient-by-Design_03B-768x506 768w,https://assets.crowdstrike.com/is/image/crowdstrikeinc/0924_04_Post-Fal.Con_Resilient-by-Design_03B-1024x674 1024w,https://assets.crowdstrike.com/is/image/crowdstrikeinc/0924_04_Post-Fal.Con_Resilient-by-Design_03B-300x198 300w" sizes="(max-width: 1060px) 100vw, 1060px"/> </div> </div> <div style="display: none;"> </div> </div> <div class="container-wp aem-GridColumn aem-GridColumn--default--12"> <div id="container-32d626e2e8" class="cmp-container-wp" data-cmp-is="simple-container" data-is-transparent-header="false"> <div class="text text--blog-content"> <div class="cmp-text" id="text-fcb597f498" data-cmp-name="cmp-text-" data-cmp-is="text" data-target-location="false"> <span><p> </p> <p>Our annual Fal.Con user conference is always one of the highlights of my year because it’s a chance to spend time with some of my favorite people: our customers and partners. This year’s event has special meaning for me as I reflect on all that’s happened since we last met as a community.</p> <p>From the moment I arrived and started talking with so many of you — our customers, partners and dedicated users — I felt a sense of overwhelming gratitude. The support of our community is always welcome, but this year it’s especially poignant. Whether it was words of encouragement, your trust in the CrowdStrike Falcon® platform, or your unwavering belief in what we’re building together, you uplifted us in ways that truly matter. So I want to express it again here, for those who weren’t in attendance at my keynote presentation on Tuesday: Thank you, from the bottom of my heart.</p> <p>The excitement I witnessed at Fal.Con was tangible. It was as irrepressible as the global cybersecurity community itself. The fact alone that we far surpassed our attendance goals, stretching the capacity of this huge Las Vegas venue with more than 6,000 attendees, is a testament to the resilience and passion of these security professionals — the people who put the “crowd” in CrowdStrike.</p> <p>It’s no coincidence that resilience was the main topic of my keynote and drove many of the conversations at Fal.Con. Society’s reliance on digital systems has become so vital and interconnected — and the need to fortify these connections across the global digital ecosystem has never been more urgent. That’s why I introduced a new framework to address this issue systemically. <b><i>Resilient by Design</i></b> expands on the concepts of CISA’s <i>Secure by Design</i> to help ensure that our systems and companies are built to anticipate, withstand, adapt and recover from any disruption that might compromise security, operations or availability.</p> <h2>Extending CrowdStrike’s Mission</h2> <p>CrowdStrike will continue on its primary mission: stopping breaches. At the same time, recent events have made it clear that to achieve our objective consistently, we must also work to make sure every connected system is as robust as possible.</p> <p><i>Resilient by Design</i> is both a business framework and a mindset, and it requires commitment and resolve to succeed. It’s how we drive resilience across our ecosystem, while also helping our customers become more resilient.</p> <p>First, it starts from within, by embedding the pillars of <i>Resilient by Design</i> into every CrowdStrike process and everything we do. Our focus is on creating the industry’s best technology to protect customers and stop breaches, as well as creating the most resilient solution. Let me explain the three principal pillars of this program and how CrowdStrike is internalizing them:</p> <ol><li><b>Foundational: </b>Simply put, resilience must be a foundational element of our company. Everything we do at CrowdStrike will have a lens on how we can enhance resilience. We have already shared many of the process improvements made in the past two months, and we continue in our commitment to strengthen every aspect of what we do, from code and deployment to configuration and support.</li><li><b>Adaptive: </b>We need to be adaptive to our customer needs, to recognize that one size doesn’t fit all customers. Part of this involves focusing on the diverse needs of our customers’ industries — recognizing that finance is different from manufacturing, for example. Healthcare is different from utilities, and technology is different from government. By adapting what we do to address this diversity, we can build and deliver highly resilient security solutions and outcomes that fit the needs of our customers.</li><li><b>Continuous: </b>There needs to be a perpetual feedback loop that enables constant learning and improvement. We want to incorporate what we learn from you, and from the industry, and make sure that’s built into our foundation. This continuous learning is already part of our DNA, if you consider how we leverage the power of the cloud and the crowd in the Falcon platform. We are constantly monitoring what's in the environment, observing threats as they evolve, understanding the adversary's tactics and techniques, learning from and adapting to their tradecraft. By focusing on continuous improvement across all of our business processes, we can create an ecosystem where these pillars support each other and become a virtuous cycle.</li></ol> <p>Our commitment to our customers means CrowdStrike must become a positive example of <i>Resilient by Design</i>. We are resolved to do exactly that.</p> <h2>Looking Ahead</h2> <p>As our customers expect — and rightfully demand from us — CrowdStrike will continue to innovate, collaborate and push the boundaries of digital defense, leading with purpose and determination. We are working alongside the very best — our customers, partners, industry leaders and government partners — to build a better, more secure and stable future.</p> <p>To that end, I invited Microsoft Chairman and CEO Satya Nadella to join me during my Fal.Con 2024 keynote. This historic collaboration might have once seemed unthinkable, but the stakes are simply too high for us to work in silos. The inextricable interconnection of our systems demands a unified, coordinated approach. Above all, working together is in the best interests of our customers.</p> <p><iframe class="vidyard_iframe" src="//play.vidyard.com/7if9tboPHjZXHa6TfF7XNT.html?" width="640" height="360" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen"></iframe></p> <p>Pursuing resilience is not optional — it’s essential for all of us. These principles will drive the next phase of growth for our company, our industry and the broader ecosystem on which we all depend. <i>Resilient by Design</i> guides us on our ultimate mission of stopping breaches.</p> </span> </div> </div> </div> </div> <div class="sociallinks aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-wp-social-links" id="sociallinks-en-us-05-08-2024" data-target-location="false"> <ul class="list-share-buttons"> <li class="share-button"> <a class="tweet-btn " target="_blank" rel="noopener noreferrer" href="https://twitter.com/share?text=Recognizing+the+Resilience+of+the+CrowdStrike+Community&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="https://twitter.com/share?text=Recognizing+the+Resilience+of+the+CrowdStrike+Community&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/" data-uw-rm-kbnav="click" aria-label="Tweet - open in a new tab" data-uw-rm-ext-link="" uw-rm-external-link-id="https://twitter.com/share?text=Recognizing+the+Resilience+of+the+CrowdStrike+Community&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/$tweet"> <span class="fa-brands fa-x-twitter"></span> <span class="tweet-text">Tweet</span> </a> </li> <li class="share-button"> <a class="li-btn" target="_blank" rel="noopener noreferrer" href="https://www.linkedin.com/shareArticle?mini=true&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/&title=Recognizing+the+Resilience+of+the+CrowdStrike+Community" data-link-tracked="true" data-uw-rm-kbnav="click" aria-label="Share - open in a new tab" data-uw-rm-ext-link="" uw-rm-external-link-id="https://www.linkedin.com/shareArticle?mini=true&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/&title=Recognizing+the+Resilience+of+the+CrowdStrike+Community$share"> <span class="fa-brands fa-linkedin"></span> <span class="li-text">Share</span> </a> </li> </ul> </div> <div style="display: none;"> </div> </div> <div class="image aem-GridColumn aem-GridColumn--default--12"> <div data-cmp-is="image" data-asset-id="6e7a658d-5015-4a48-9f5e-6fc1753cf822" data-title="Breaches Stop Here" id="image-en-us-05-15-2024" data-cmp-hook-image="imageV3" class="cmp-image" itemscope itemtype="http://schema.org/ImageObject" data-target-location="false"> <img src="/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/.coreimg.jpeg/structure/_jcr_content/root/container/container/image_1535775213/1725276875657/breaches-stop-here-post-cta.jpeg" class="cmp-image__image" itemprop="contentUrl" alt="Breaches Stop Here"/> <svg class="cmp-image__play-icon__image-alt"> <use href="#play-alt" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#play-alt"></use> </svg> </div> <div style="display: none;"> </div> </div> <div class="relatedcontent aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-wp-related-content" id="relatedcontent-en-us-05-08-2024" data-target-location="false"> <h5>Related Content</h5> <div class="row recent_articles"> <a class="col-12 col-md-4 recent_articles_item" href="/en-us/blog/csu-fast-track-fuels-cybersecurity-training/"> <div class="post_image"> <img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CSU-FastTrack" alt="CrowdStrike University Fast Track Fuels Cybersecurity Training"/> </div> <div class="post_info"> <h6>CrowdStrike University Fast Track Fuels Cybersecurity Training</h6> <div class="excerpt"></div> </div> </a> <a class="col-12 col-md-4 recent_articles_item" href="/en-us/blog/crowdstrike-launches-ai-red-team-services/"> <div class="post_image"> <img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-Red-Team" alt="CrowdStrike Launches AI Red Team Services to Secure AI Innovation"/> </div> <div class="post_info"> <h6>CrowdStrike Launches AI Red Team Services to Secure AI Innovation</h6> <div class="excerpt"></div> </div> </a> <a class="col-12 col-md-4 recent_articles_item" href="/en-us/blog/crowdstrike-acquires-adaptive-shield-and-integrates-saas-protection/"> <div class="post_image"> <img src="https://assets.crowdstrike.com/is/image/crowdstrikeinc/alpine-blog-social" alt="CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management"/> </div> <div class="post_info"> <h6>CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management</h6> <div class="excerpt"></div> </div> </a> </div> </div> <div style="display: none;"> </div> </div> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> </div> </div> </div> </div> </div> <div class="container-wp container-wp--right-sidebar-blog aem-GridColumn aem-GridColumn--default--12"> <div id="container-1c191e77ed" class="cmp-container-wp" data-cmp-is="responsive-grid-container" data-padding-left="16" data-padding-right="16"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="experiencefragment aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="cmp-wp-modal modal_insert_location aem-GridColumn aem-GridColumn--default--12"> <div data-id="wistia_player_embed"></div> <div id="subscribe" class="container"> <div class="row"> <div class="col-lg-12"> <div id="modal-inner-mask" class="modal_mask"> <div class="close_button"><i data-id="modal-close" class="fa fa-close"></i></div> <div class="modal-insert-wrapper"> <div id="modal-insert" class="modal_content"> <div class="modal_form_embed"> <iframe src="https://go.crowdstrike.com/NewsAndComms.html"></iframe> </div> </div> </div> </div> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="categories aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-wp-categories" id="categories-en-us-08-19-2024" data-target-location="false"> <div class="blog_subsection"> <div class="blog_section_subtitle"> <div class="title">Categories</div> </div> </div> <div class="blog_featured_category_list"> <ul> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.ai-machine-learning/"> <div class="category-type ai-machine-learning"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogicon-test-3.svg"/> </div> <div class="category_name">AI & Machine Learning</div> <div class="count ml-auto">23</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.cloud-security/"> <div class="category-type cloud-security"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogIcon-test-image-1.svg"/> </div> <div class="category_name">Cloud & Application Security</div> <div class="count ml-auto">117</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.counter-adversary-operations/"> <div class="category-type counter-adversary-operations"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Counter-Adversary-Operations.svg"/> </div> <div class="category_name">Counter Adversary Operations</div> <div class="count ml-auto">189</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.endpoint-protection/"> <div class="category-type endpoint-protection"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Endpoint-Security-And-XDR.svg"/> </div> <div class="category_name">Endpoint Security & XDR</div> <div class="count ml-auto">307</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.engineering-and-technology/"> <div class="category-type engineering-and-technology"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Engineering-Tech.svg"/> </div> <div class="category_name">Engineering & Tech</div> <div class="count ml-auto">79</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.executive-viewpoint/"> <div class="category-type executive-viewpoint"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Executive-Viewpoint.svg"/> </div> <div class="category_name">Executive Viewpoint</div> <div class="count ml-auto">165</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.exposure-management/"> <div class="category-type exposure-management"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/BlogIcon-test-image-2.svg"/> </div> <div class="category_name">Exposure Management</div> <div class="count ml-auto">89</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.from-the-front-lines/"> <div class="category-type from-the-front-lines"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/From-The-Front-Lines.svg"/> </div> <div class="category_name">From The Front Lines</div> <div class="count ml-auto">190</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.identity-protection/"> <div class="category-type identity-protection"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Identity-Protection.svg"/> </div> <div class="category_name">Identity Protection</div> <div class="count ml-auto">45</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.observability-and-log-management/"> <div class="category-type observability-and-log-management"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/Nest-Gen-SIEM-and-LOG-Management.svg"/> </div> <div class="category_name">Next-Gen SIEM & Log Management</div> <div class="count ml-auto">95</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.public-sector/"> <div class="category-type public-sector"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogicon-test-4.png"/> </div> <div class="category_name">Public Sector</div> <div class="count ml-auto">38</div> </a> </li> <li> <a class="category-sidebar-link d-flex align-items-center" href="/en-us/blog/category.small-business/"> <div class="category-type small-business"> <img class="category-icon" src="/content/dam/crowdstrike/marketing/en-us/icons/blogicon-test5.svg"/> </div> <div class="category_name">Small Business</div> <div class="count ml-auto">10</div> </a> </li> </ul> </div> </div> <div style="display: none;"> </div> </div> <div class="sociallinks aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-social-links-wp" id="sociallinks-en-us-08-19-2024" data-target-location="false"> <div class="social"> <h6>CONNECT WITH US</h6> <div class="social_icons"> <a href="https://www.linkedin.com/company/crowdstrike" target="_blank" data-link-tracked="true" aria-label="linkedin" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="https://www.linkedin.com/company/crowdstrike"> <span class="fa-brands fa-linkedin"></span> </a> <a href="https://twitter.com/CrowdStrike" target="_blank" data-link-tracked="true" aria-label="twitter" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="https://www.linkedin.com/company/crowdstrike"> <span class="fa-brands fa-x-twitter"></span> </a> <a href="https://www.facebook.com/CrowdStrike/" target="_blank" data-link-tracked="true" aria-label="facebook" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="https://www.facebook.com/CrowdStrike/"> <span class="fa-brands fa-facebook"></span> </a> <a href="https://www.instagram.com/crowdstrike/?hl=en" target="_blank" data-link-tracked="true" aria-label="instagram" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="https://www.instagram.com/crowdstrike/?hl=en"> <span class="fa-brands fa-instagram"></span> </a> <a href="http://www.youtube.com/user/CrowdStrike" target="_blank" data-link-tracked="true" aria-label="youtube" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="http://www.youtube.com/user/CrowdStrike"> <span class="fa-brands fa-youtube"></span> </a> <a href="/en-us/blog/feed" target="_blank" data-link-tracked="true" aria-label="rss" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="/en-us/blog/feed"> <span class="fa fa-rss"></span> </a> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="image aem-GridColumn aem-GridColumn--default--12"> <div data-cmp-is="image" data-asset-id="c5874f54-1fc1-41e2-aa01-34322cf2a025" data-title="background pattern" id="image-en-us-08-19-2024" data-cmp-hook-image="imageV3" class="cmp-image" itemscope itemtype="http://schema.org/ImageObject" data-target-location="false"> <a class="cmp-image__link" href="https://www.crowdstrike.com/products/trials/try-falcon-prevent" title="background pattern" data-title="background pattern" target="_self"> <img src="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/blogs/right-rail/right-rail/master/_jcr_content/root/responsivegrid/image.coreimg.jpeg/1725276622301/cs-free-trial-blog-300x600-final.jpeg" class="cmp-image__image" itemprop="contentUrl" alt="background pattern"/> <svg class="cmp-image__play-icon__image-alt"> <use href="#play-alt" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#play-alt"></use> </svg> </a> </div> <div style="display: none;"> </div> </div> <div class="featuredarticlessidebar aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-wp-logo" id="featurearticlessidebar-en-us-08-19-2024" data-target-location="false"> <div id="side-bar-featured-articles"> <div class="featured_articles_sidebar"> <h6 data-uw-rm-heading="level" role="heading" aria-level="5">FEATURED ARTICLES</h6> <a class="post" href="/en-us/blog/authorities-indict-indrik-spider-members-detail-ties-bitwise-spider-russian-state/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/authorities-indict-indrik-spider-members-detail-ties-bitwise-spider-russian-state.html"> <div class="title"></div> <div class="date">October 01, 2024</div> </a> <a class="post" href="/en-us/blog/crowdstrike-named-leader-2024-gartner-magic-quadrant-endpoint-protection/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-named-leader-2024-gartner-magic-quadrant-endpoint-protection.html"> <div class="title">CrowdStrike Named a Leader in 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms</div> <div class="date">September 25, 2024</div> </a> <a class="post" href="/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024.html"> <div class="title">Recognizing the Resilience of the CrowdStrike Community</div> <div class="date">September 25, 2024</div> </a> <a class="post" href="/en-us/blog/driving-cybersecurity-forward-new-innovations-fal-con-2024/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/driving-cybersecurity-forward-new-innovations-fal-con-2024.html"> <div class="title">CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection</div> <div class="date">September 18, 2024</div> </a> </div> </div> </div> <div style="display: none;"> </div> </div> <div class="teaser aem-GridColumn aem-GridColumn--default--12"> <div id="blogSubscribe teaser-en-us-subscribe-08-19-2024"> <div class="subscribe_cta"> <h6>SUBSCRIBE</h6> <p><p>Sign up now to receive the latest notifications and updates from CrowdStrike.</p> </p> <button class="button white-text white-outline white-text-hover dark-red-background-hover dark-red-outline-hover" data-behavior-modal data-modal-link="modal:subscribe">Sign Up</button> </div> </div> <div style="display: none;"> </div> <div style="display: none;"> </div> </div> <div class="teaser aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-wp-falcon-banner-sidebar" id="teaser-en-us-see-crowdstrike-falcon®-i-10-01-2024"> <div class="demo_cta"> <div class="cmp-teaser__image"> <div data-cmp-is="image" data-asset-id="bd2863f7-8f64-4b7b-81f2-ff026eb13d91" data-title="red-falcon" id="image-en-us-10-01-2024" data-cmp-hook-image="imageV3" class="cmp-image" itemscope itemtype="http://schema.org/ImageObject" data-target-location="false"> <img src="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/blogs/right-rail/right-rail/master/_jcr_content/root/responsivegrid/teaser_893945246.coreimg.svg/1727796180789/red-falcon.svg" class="cmp-image__image" itemprop="contentUrl" alt="Created with Sketch." title="red-falcon"/> <svg class="cmp-image__play-icon__image-alt"> <use href="#play-alt" xmlns:xlink="https://www.w3.org/1999/xlink" xlink:href="#play-alt"></use> </svg> <meta itemprop="caption" content="red-falcon"/> </div> <div style="display: none;"> </div> </div> <h6>See CrowdStrike Falcon<sup>®</sup> in Action</h6> <p><p>Detect, prevent, and respond to attacks— even malware-free intrusions—at any stage, with next-generation endpoint protection.</p> </p> <a class=" button white-text red-background red-outline white-text-hover dark-red-background-hover dark-red-outline-hover" href="https://www.crowdstrike.com/products/demos/" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="https://www.crowdstrike.com/products/demos/">See Demo</a> </div> </div> <div style="display: none;"> </div> <div style="display: none;"> </div> </div> </div> </div> </div> </div> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> </div> </div> </div> </div> </div> <div class="previousnext container-wp--prev-next aem-GridColumn aem-GridColumn--default--12"> <div class="cmp-wp-previous-next" id="previousnext-en-us-05-08-2024" data-target-location="false"> <div class="post_nav row"> <div class="col-12"> <div class="links"> <span class="fa fa-angle-double-left"></span> <a href="/en-us/blog/driving-cybersecurity-forward-new-innovations-fal-con-2024/" rel="prev" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/driving-cybersecurity-forward-new-innovations-fal-con-2024.html"> CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection </a> </div> <div class="links"> <a href="/en-us/blog/fal-con-europe-2024/" rel="next" data-link-tracked="true" data-uw-rm-brl="PR" data-uw-original-href="/content/crowdstrike-www/locale-sites/us/en-us/blog/fal-con-europe-2024.html"> Fal.Con Europe: Bringing the Power of the Crowd to Amsterdam </a> <span class="fa fa-angle-double-right"></span> </div> </div> </div> </div> <div style="display: none;"> </div> </div> </div> </div> </div> <div class="experiencefragment aem-GridColumn aem-GridColumn--default--12"> <div id="experiencefragment-7a3575d8e8" class="cmp-experiencefragment cmp-experiencefragment--footer" data-target-location="false"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="responsivegrid aem-GridColumn aem-GridColumn--default--12"> <div class="aem-Grid aem-Grid--12 aem-Grid--default--12 "> <div class="footer list aem-GridColumn aem-GridColumn--default--12"><div class="container"> <div class="row"> <div class="col-md-12 top"> <span class="footer-logo"> <a class="cmp-wp-logo crowdstrike_logo" href="https://www.crowdstrike.com/en-us" data-target-location="false"> <img src="/content/experience-fragments/crowdstrike-www/locale-sites/us/en-us/site/blogs/footer/footer/master/_jcr_content/root/responsivegrid/footer/logo.coreimg.svg/1739205395889/black-crowdstrike-logo-footer.svg" alt="logo"/> </a> <div style="display: none;"> </div> </span> <div class="cmp-social-links" id="sociallinks-en-us-02-10-2025" data-target-location="false"> <ul class="row social-links"> <li class="circle-icon-outline"> <a href="https://twitter.com/CrowdStrike" target="_blank" data-link-tracked="true" aria-label="twitter - open in a new tab" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="https://twitter.com/CrowdStrike" data-uw-rm-ext-link="" uw-rm-external-link-id="https://twitter.com/CrowdStrike$twitter"> <i class="fa-brands fa-x-twitter"></i> </a> </li> <li class="circle-icon-outline"> <a href="https://www.facebook.com/CrowdStrike/" target="_blank" data-link-tracked="true" aria-label="facebook - open in a new tab" data-uw-rm-empty-ctrl="" data-uw-rm-brl="PR" data-uw-original-href="https://www.facebook.com/CrowdStrike/" data-uw-rm-ext-link="" uw-rm-external-link-id="https://www.facebook.com/CrowdStrike//$facebook"> <i class="fa-brands fa-facebook"></i> </a> </li> <li class="circle-icon-outline"> <a href="https://www.linkedin.com/company/crowdstrike" target="_blank" data-link-tracked="true" aria-label="linkedin - open in a new tab" data-uw-rm-empty-ctrl="" data-uw-rm-ext-link="" uw-rm-external-link-id="https://www.linkedin.com/company/crowdstrike$linkedin"> <i class="fa-brands fa-linkedin"></i> </a> </li> <li class="circle-icon-outline"> <a href="http://www.youtube.com/user/CrowdStrike" target="_blank" data-link-tracked="true" aria-label="youtube - open in a new tab" data-uw-rm-empty-ctrl="" data-uw-rm-ext-link="" uw-rm-external-link-id="http://www.youtube.com/user/CrowdStrike$youtube"> <i class="fa-brands fa-youtube"></i> </a> </li> </ul> </div> <div style="display: none;"> </div> </div> <div class="col-md-12 bottom"> <ul class="row footer-lower-links" id="list-en-us-02-10-2025"> <li> <span>Copyright © 2025 CrowdStrike</span> </li> <li> <a href="https://www.crowdstrike.com/privacy-notice/"> <span> Privacy</span> </a> </li> <li> <a href="https://www.crowdstrike.com/services/request-information/"> <span> Request Info</span> </a> </li> <li> <a href="https://www.crowdstrike.com/blog/"> <span> Blog</span> </a> </li> <li> <a href="https://www.crowdstrike.com/contact-us/"> <span> Contact Us</span> </a> </li> <li> <span> 1.888.512.8906</span> </li> <li> <a href="#" class="cs-uw-accessibilityWidget"> <span> Accessibility</span> </a> </li> </ul> </div> </div> </div> <div style="display: none;"> </div> </div> </div> </div> </div> </div> </div> </div> </div> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-common.lc-d744478aa261bc0777f6e28dc4b5009a-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-wp.lc-bf81dab4652f7e4cfd5c8b7445d7a0b8-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-addsearch.lc-44aae0e72799060f62e36b1a27882f08-lc.min.js"></script> <script src="/etc.clientlibs/core/wcm/components/commons/site/clientlibs/container.lc-0a6aff292f5cc42142779cde92054524-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-base.lc-98b44ec74775c5bc76b0744df1c9b66c-lc.min.js"></script> <script src="/etc.clientlibs/crowdstrike/clientlibs/crowdstrike-lottie.lc-49e94cb6c05cd98513468744a85638cb-lc.min.js"></script> <div class="cloudservice includedatalayer"> <script> if(!window.digitalData || Object.keys(window.digitalData).length === 0 ) { window.digitalData = { "component" : [ { "facebookUrl" : "https://www.facebook.com/CrowdStrike", "linkedInUrl" : "https://www.linkedin.com/company/crowdstrike", "youtubeUrl" : "https://www.youtube.com/user/CrowdStrike", "twitterUrl" : "https://www.twitter.com/CrowdStrike", "componentInfo" : { } }, { "componentInfo" : { }, "id" : "logo-en-us-10-03-2024", "title" : "BLOG", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog" }, { "recentLabel" : "Recent", "videoLabel" : "Video", "featuredPagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/featured-articles.html", "categoryParentPath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/categories-overview.html", "categoryLabel" : "Category", "recentPagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/recent-articles.html", "freeTrialLabel" : "Start Free Trial", "children" : [ { "pageTitle" : "Video Highlights the 4 Key Steps to Successful Incident Response", "publishDate" : "Dec 02, 2019", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/IR-Video-Blog-1", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/video-highlights-the-4-key-steps-to-successful-incident-response.html" }, { "pageTitle" : "Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO]", "publishDate" : "Feb 21, 2019", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/video-ATTCK2-1", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/helping-non-security-stakeholders-understand-attck-in-10-minutes-or-less.html" }, { "pageTitle" : "Qatar’s Commercial Bank Chooses CrowdStrike Falcon®: A Partnership Based on Trust [VIDEO]", "publishDate" : "Aug 20, 2018", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Edward-Gonam-Qatar-Blog2-1", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/qatars-commercial-bank-chooses-crowdstrike-falcon-a-partnership-based-on-trust.html" }, { "pageTitle" : "Endpoint Protection and Threat Intelligence: The Way Forward [VIDEO]", "publishDate" : "Aug 05, 2018", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/GK-Blog_Images-1", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/how-crowdstrike-integrates-threat-intelligence-with-endpoint-protection.html" }, { "children" : "[{\"pageTitle\":\"Improving Kubernetes Security: Lessons from an Istio Configuration Finding\",\"publishDate\":\"02/06/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Kubernetes-AI\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/istio-configuration-finding-improve-kubernetes-security.html\"},{\"pageTitle\":\"CrowdStrike Extends Powerful Falcon Platform Capabilities into Red Hat OpenShift \",\"publishDate\":\"01/28/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-RedHat\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-extends-powerful-falcon-platform-capabilities-red-hat-openshift.html\"},{\"pageTitle\":\"The Critical Evolution of Cloud Detection and Response\",\"publishDate\":\"01/15/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-ModernCDR\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/critical-evolution-of-cdr.html\"},{\"pageTitle\":\"CrowdStrike Strengthens Container Security with Registry Scanning for Hybrid Clouds\",\"publishDate\":\"01/08/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_16_EnhancedSecurity_RegistryScanning\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/enhanced-security-with-registry-scanning-hybrid-cloud.html\"}]", "title" : "Cloud & Application Security", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.cloud-security.html" }, { "children" : "[{\"pageTitle\":\"Naming Names: How Adversary Taxonomies Strengthen Global Security\",\"publishDate\":\"02/12/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Adversary-Naming\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/how-adversary-taxonomies-strengthen-global-security.html\"},{\"pageTitle\":\"CrowdStrike Insider Risk Services Defend Against the Threats Within\",\"publishDate\":\"01/15/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_26_InsiderRiskServices\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-launches-insider-risk-services.html\"},{\"pageTitle\":\"Recruitment Phishing Scam Imitates CrowdStrike Hiring Process\",\"publishDate\":\"01/08/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1121_05_Scheming_URLS\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/recruitment-phishing-scam-imitates-crowdstrike-hiring-process.html\"},{\"pageTitle\":\"A Look Back: The Evolution of Latin American eCrime Malware in 2024\",\"publishDate\":\"12/16/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_10_LatinAmericaneCrime\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/latam-ecrime-malware-evolution-2024.html\"}]", "title" : "Counter Adversary Operations", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.counter-adversary-operations.html" }, { "children" : "[{\"pageTitle\":\"Q\\u0026A: How Mastronardi Produce Secures Innovation with CrowdStrike\",\"publishDate\":\"02/14/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CustomerStory-Mastronardi\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike.html\"},{\"pageTitle\":\"University of Sunderland Goes from Ransomware Recovery to Proactive Defense with CrowdStrike\",\"publishDate\":\"02/04/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CaseStudy-University-Sunderland\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/university-of-sunderland-proactive-defense.html\"},{\"pageTitle\":\"CrowdStrike Falcon Platform Achieves Perfect Score in SE Labs’ Most Comprehensive Ransomware Evaluation\",\"publishDate\":\"01/28/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-trophy\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-falcon-earns-perfect-score-in-se-labs-ransomware-evaluation.html\"},{\"pageTitle\":\"CrowdStrike Falcon for Legacy Systems: Modern Security for Legacy Environments\",\"publishDate\":\"01/15/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_25_FalconforLegacySystems\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/modern-security-for-legacy-environments.html\"}]", "title" : "Endpoint Security & XDR", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.endpoint-protection.html" }, { "children" : "[{\"pageTitle\":\"Leveraging CrowdStrike Falcon Against Attacks Targeting Okta Environments\",\"publishDate\":\"01/21/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Identity-NGS\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/leveraging-crowdstrike-falcon-against-attacks-targeting-okta.html\"},{\"pageTitle\":\"Tech Analysis: Channel File May Contain Null Bytes\",\"publishDate\":\"07/24/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/ResourceCards-04\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/tech-analysis-channel-file-may-contain-null-bytes.html\"},{\"pageTitle\":\"EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis\",\"publishDate\":\"06/06/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Falcon-Script-Control-Blog-1-1024x674\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/embersim-large-databank-for-similarity-research-in-cybersecurity.html\"},{\"pageTitle\":\"CrowdStrike Falcon Next-Gen SIEM Unveils Advanced Detection of Ransomware Targeting VMware ESXi Environments\",\"publishDate\":\"04/15/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/XXXX_Falcon-LogScale-So-Fast_Blog_1060x698\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/esxi-ransomware-detection-falcon-next-gen-siem.html\"}]", "title" : "Engineering & Tech", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.engineering-and-technology.html" }, { "children" : "[{\"pageTitle\":\"CrowdStrike University Fast Track Fuels Cybersecurity Training\",\"publishDate\":\"02/10/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CSU-FastTrack\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/csu-fast-track-fuels-cybersecurity-training.html\"},{\"pageTitle\":\"CrowdStrike Launches AI Red Team Services to Secure AI Innovation\",\"publishDate\":\"11/07/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-Red-Team\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-launches-ai-red-team-services.html\"},{\"pageTitle\":\"CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management\",\"publishDate\":\"11/06/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/alpine-blog-social\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-acquires-adaptive-shield-and-integrates-saas-protection.html\"},{\"pageTitle\":\"Fal.Con Europe: Bringing the Power of the Crowd to Amsterdam\",\"publishDate\":\"10/14/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/blog-1024_02_Fal.Con-Europe_01\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/fal-con-europe-2024.html\"}]", "title" : "Executive Viewpoint", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.executive-viewpoint.html" }, { "children" : "[{\"pageTitle\":\"CrowdStrike Named a Leader with “Bold Vision” in 2024 Forrester Wave for Cybersecurity Incident Response Services\",\"publishDate\":\"06/10/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/xdr-wave-blog-image-1068x698-headline-3-1024x669\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-named-leader-for-cybersecurity-incident-response-services-q2-2024.html\"},{\"pageTitle\":\"How to Defend Employees and Data as Social Engineering Evolves\",\"publishDate\":\"03/22/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog_0520_08-1\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/how-to-defend-employees-data-as-social-engineering-evolves.html\"},{\"pageTitle\":\"The Anatomy of an ALPHA SPIDER Ransomware Attack\",\"publishDate\":\"02/29/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/SPIDER-adversary-blog-main-image\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/anatomy-of-alpha-spider-ransomware.html\"},{\"pageTitle\":\"CrowdStrike Services Offers Incident Response Executive Preparation Checklist\",\"publishDate\":\"10/23/23\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/0122_03_IR_Tracker_for_DFIR_Community\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-incident-response-executive-prep-checklist.html\"}]", "title" : "From The Front Lines", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.from-the-front-lines.html" }, { "children" : "[{\"pageTitle\":\"Caught in the Act: CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections\",\"publishDate\":\"02/04/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-LDAP\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/inside-crowdstrike-ml-powered-ldap-reconnaissance-detections.html\"},{\"pageTitle\":\"CrowdStrike Falcon Identity Protection Delivered $1.26M in Total Benefits Over Three Years\",\"publishDate\":\"01/16/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/BLog-ForresterTEI-Report\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/falcon-identity-protection-forrester-tei-study.html\"},{\"pageTitle\":\"Adaptive Shield, a CrowdStrike Company, Leads in 2024 Frost Radar SSPM Leadership Report\",\"publishDate\":\"12/09/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-image-Frost-SSPM\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/adaptive-shield-crowdstrike-company-leads-2024-frost-radar-sspm-leadership-report.html\"},{\"pageTitle\":\"CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center \",\"publishDate\":\"12/04/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_01_Identity Protection\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/announcing-protection-aws-iam-identity-center.html\"}]", "title" : "Identity Protection", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.identity-protection.html" }, { "children" : "[{\"pageTitle\":\"Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM\",\"publishDate\":\"02/13/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-NG-SIEM-DataExfiltration\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem.html\"},{\"pageTitle\":\"CrowdStrike Falcon Next-Gen SIEM’s First Year Transforming the SOC\",\"publishDate\":\"12/23/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_17_Next-GenSIEM\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/first-year-of-falcon-next-gen-siem-transforming-soc.html\"},{\"pageTitle\":\"CrowdStrike and Cribl Expand Partnership with CrowdStream for Next-Gen SIEM\",\"publishDate\":\"11/21/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/0324_02_Next-Gen_SIEM\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/cribl-partnership-crowdstream-expansion.html\"},{\"pageTitle\":\"Falcon Foundry: Build Custom Apps to Solve Tough Security Challenges\",\"publishDate\":\"10/22/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog_1060x698-new-us\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/building-custom-apps-with-crowdstrike-falcon-foundry.html\"}]", "title" : "Next-Gen SIEM & Log Management", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.observability-and-log-management.html" }, { "children" : "[{\"pageTitle\":\"Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals\",\"publishDate\":\"01/16/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_22_ZeroTrust\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/govcloud-1-authorization-for-crowdstrike-modules.html\"},{\"pageTitle\":\"CrowdStrike Statement on Bloomberg’s October 25, 2024 Story\",\"publishDate\":\"10/25/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Falcon-on-white\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-statement-bloomberg.html\"},{\"pageTitle\":\"Achieving Ecosystem-level Cybersecurity: A U.S. Policy Perspective\",\"publishDate\":\"06/11/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/0522_11_Falcon_ID-Threat-Protection_Fed-State-Local_Blog_1060x698\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/next-steps-for-ecosystem-level-cybersecurity.html\"},{\"pageTitle\":\"CrowdStrike Launches SEC Readiness Services to Prepare Boardrooms for New Regulations\",\"publishDate\":\"03/14/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog_1060x698-66-us\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/sec_readiness.html\"}]", "title" : "Public Sector", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.public-sector.html" }, { "children" : "[{\"pageTitle\":\"February 2025 Patch Tuesday: Four Zero-Days and Three Critical Vulnerabilities Among 67 CVEs\",\"publishDate\":\"02/11/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-PT-2025\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/patch-tuesday-analysis-february-2025.html\"},{\"pageTitle\":\"January 2025 Patch Tuesday: 10 Critical Vulnerabilities and Eight Zero-Days Among 159 CVEs \",\"publishDate\":\"01/14/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-PT-new\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/patch-tuesday-analysis-january-2025.html\"},{\"pageTitle\":\"Assessing Misconfigurations at Scale with Falcon Exposure Management\",\"publishDate\":\"12/19/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_12_AssessingMisconfigurations\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/assess-misconfigurations-at-scale-with-fem.html\"},{\"pageTitle\":\"December 2024 Patch Tuesday: 16 Critical and One Zero-Day Among 71 Vulnerabilities \",\"publishDate\":\"12/10/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/patch-tuesday-blog-1\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/patch-tuesday-analysis-december-2024.html\"}]", "title" : "Exposure Management", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.exposure-management.html" }, { "children" : "[{\"pageTitle\":\"One Year of Falcon Go: Transforming Cybersecurity for Small Businesses\",\"publishDate\":\"12/03/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-1224_01_SMBs\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/one-year-of-falcon-go-transforming-cybersecurity.html\"},{\"pageTitle\":\"CrowdStrike Strengthens SMB Security with Seamless Mobile Protection\",\"publishDate\":\"11/21/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/blog-1024_03_SMB-Big-Protection\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/smb-security-seamless-mobile-protection.html\"},{\"pageTitle\":\"Small Business, Big Defense: Four Pillars of an Effective Cybersecurity Awareness Program\",\"publishDate\":\"10/14/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/blog-1024_03_SMB-Big-Protection\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/four-steps-to-increase-cyber-resilience.html\"},{\"pageTitle\":\"3 Ways Small Businesses Can Make Big Strides in Cybersecurity\",\"publishDate\":\"06/14/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/1022_08_Small-Business-Rethink-Cybersecurity_Blog_1060x698\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/3-ways-small-businesses-big-strides-cybersecurity.html\"}]", "title" : "Small Business", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.small-business.html" }, { "children" : "[{\"pageTitle\":\"CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage\",\"publishDate\":\"02/13/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Agentic-AI\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage.html\"},{\"pageTitle\":\"The Evolving Role of AI in Data Protection \",\"publishDate\":\"01/29/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-DataProtection\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/the-evolving-role-of-ai-in-data-protection.html\"},{\"pageTitle\":\"CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats\",\"publishDate\":\"01/22/25\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-ML-Brain\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/contrastive-learning-enhance-malware-threat-detection.html\"},{\"pageTitle\":\"80% of Cybersecurity Leaders Prefer Platform-Delivered GenAI for Stronger Defense \",\"publishDate\":\"12/17/24\",\"pageThumbnail\":\"https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Ai-Survey\",\"url\":\"/content/crowdstrike-www/locale-sites/us/en-us/blog/research-results-state-of-ai-cybersecurity-survey.html\"}]", "title" : "AI & Machine Learning", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.ai-machine-learning.html" }, { "pageTitle" : "Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike", "publishDate" : "Feb 14, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CustomerStory-Mastronardi", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike.html" }, { "pageTitle" : "CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage", "publishDate" : "Feb 13, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Agentic-AI", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage.html" }, { "pageTitle" : "Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM", "publishDate" : "Feb 13, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-NG-SIEM-DataExfiltration", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem.html" }, { "pageTitle" : "Naming Names: How Adversary Taxonomies Strengthen Global Security", "publishDate" : "Feb 12, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Adversary-Naming", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/how-adversary-taxonomies-strengthen-global-security.html" }, { "pageTitle" : "Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike", "publishDate" : "Feb 14, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CustomerStory-Mastronardi", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/how-mastronardi-produce-secures-innovation-with-crowdstrike.html" }, { "pageTitle" : "CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage", "publishDate" : "Feb 13, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Agentic-AI", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/agentic-ai-innovation-in-cybersecurity-charlotte-ai-detection-triage.html" }, { "pageTitle" : "Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM", "publishDate" : "Feb 13, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-NG-SIEM-DataExfiltration", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/detect-data-exfiltration-techniques-falcon-ng-siem.html" }, { "pageTitle" : "Naming Names: How Adversary Taxonomies Strengthen Global Security", "publishDate" : "Feb 12, 2025", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-Adversary-Naming", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/how-adversary-taxonomies-strengthen-global-security.html" } ], "componentInfo" : { }, "id" : "navigation-en-us-10-03-2024", "featuredLabel" : "Featured", "videoPagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/videos.html", "freeTrialPagePath" : "https://www.crowdstrike.com/products/trials/try-falcon-prevent" }, { "pageTitle" : "Recognizing the Resilience of the CrowdStrike Community", "author" : "George Kurtz", "publishDate" : "September 25, 2024", "componentInfo" : { }, "authorLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/author.george-kurtz.html", "id" : "headline-en-us-04-19-2024", "categories" : "Executive Viewpoint", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.executive-viewpoint.html", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/0924_04_Post-Fal.Con_Resilient-by-Design_03B" }, { "linkedInUrl" : "https://www.linkedin.com/shareArticle", "twitterUrl" : "https://twitter.com/share", "twitterShareUrl" : "https://twitter.com/share?text=Recognizing+the+Resilience+of+the+CrowdStrike+Community&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/", "componentInfo" : { }, "rssFeedUrl" : "/en-us/blog/feed", "id" : "sociallinks-en-us-05-08-2024", "linkedInShareUrl" : "https://www.linkedin.com/shareArticle?mini=true&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/&title=Recognizing+the+Resilience+of+the+CrowdStrike+Community" }, { "relatedContentLabel" : "Related Content", "children" : [ { "pageTitle" : "CrowdStrike University Fast Track Fuels Cybersecurity Training", "id" : "relatedcontent-en-us-05-08-2024", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-CSU-FastTrack", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/csu-fast-track-fuels-cybersecurity-training.html" }, { "pageTitle" : "CrowdStrike Launches AI Red Team Services to Secure AI Innovation", "id" : "relatedcontent-en-us-05-08-2024", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/Blog-AI-Red-Team", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-launches-ai-red-team-services.html" }, { "pageTitle" : "CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management", "id" : "relatedcontent-en-us-05-08-2024", "pageThumbnail" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/alpine-blog-social", "url" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-acquires-adaptive-shield-and-integrates-saas-protection.html" } ], "componentInfo" : { }, "id" : "relatedcontent-en-us-05-08-2024" }, { "children" : [ { "count" : "23", "title" : "AI & Machine Learning", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.ai-machine-learning.html" }, { "count" : "117", "title" : "Cloud & Application Security", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.cloud-security.html" }, { "count" : "189", "title" : "Counter Adversary Operations", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.counter-adversary-operations.html" }, { "count" : "307", "title" : "Endpoint Security & XDR", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.endpoint-protection.html" }, { "count" : "79", "title" : "Engineering & Tech", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.engineering-and-technology.html" }, { "count" : "165", "title" : "Executive Viewpoint", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.executive-viewpoint.html" }, { "count" : "89", "title" : "Exposure Management", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.exposure-management.html" }, { "count" : "190", "title" : "From The Front Lines", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.from-the-front-lines.html" }, { "count" : "45", "title" : "Identity Protection", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.identity-protection.html" }, { "count" : "95", "title" : "Next-Gen SIEM & Log Management", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.observability-and-log-management.html" }, { "count" : "38", "title" : "Public Sector", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.public-sector.html" }, { "count" : "10", "title" : "Small Business", "categoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.small-business.html" } ], "categoryLabel" : "Categories", "componentInfo" : { }, "id" : "categories-en-us-08-19-2024" }, { "facebookUrl" : "https://www.facebook.com/CrowdStrike/", "linkedInUrl" : "https://www.linkedin.com/company/crowdstrike", "youtubeUrl" : "http://www.youtube.com/user/CrowdStrike", "twitterUrl" : "https://twitter.com/CrowdStrike", "twitterShareUrl" : "https://twitter.com/CrowdStrike?text=Recognizing+the+Resilience+of+the+CrowdStrike+Community&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/", "componentInfo" : { }, "rssFeedUrl" : "/en-us/blog/feed", "instagramUrl" : "https://www.instagram.com/crowdstrike/?hl=en", "id" : "sociallinks-en-us-08-19-2024", "linkedInShareUrl" : "https://www.linkedin.com/company/crowdstrike?mini=true&url=https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/&title=Recognizing+the+Resilience+of+the+CrowdStrike+Community" }, { "componentInfo" : { }, "id" : "image-en-us-08-19-2024", "fileReference" : "/content/dam/crowdstrike/www/en-us/wp/2021/07/CS_Free_Trial_blog_300x600_final.jpg", "thumbnailImagePath" : "/content/dam/crowdstrike/www/en-us/wp/2021/07/CS_Free_Trial_blog_300x600_final.jpg/jcr:content/renditions/cq5dam.thumbnail.319.319.png", "url" : "https://www.crowdstrike.com/products/trials/try-falcon-prevent/" }, { "componentInfo" : { }, "id" : "featurearticlessidebar-en-us-08-19-2024", "featuredList" : [ { "pageTitle" : "International Authorities Indict, Sanction Additional INDRIK SPIDER Members and Detail Ties to BITWISE SPIDER and Russian State Activity", "pagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/authorities-indict-indrik-spider-members-detail-ties-bitwise-spider-russian-state.html", "thumbnailPath" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/0924_05_Indrik-Spider-Indictment", "publishDate" : "October 01, 2024", "description" : "CrowdStrike often collaborates with law enforcement agencies to identify, track and stop cyber threats. We recently worked with law enforcement stakeholders within the U.K.’s National Crime Agency as […]", "pageAuthor" : "Counter Adversary Operations", "pageAuthorLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/author.counter-adversary-operations.html", "pageCategory" : "Counter Adversary Operations", "pageCategoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.counter-adversary-operations.html", "pageHeadlineTitle" : null, "ctaLabel" : "Counter Adversary Operations", "viewNeeded" : true }, { "pageTitle" : "CrowdStrike Named a Leader in 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms", "pagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/crowdstrike-named-leader-2024-gartner-magic-quadrant-endpoint-protection.html", "thumbnailPath" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/1060x698-Blog_2024-Gartner-MQ-for-EPP-headline-1-resize", "publishDate" : "September 25, 2024", "description" : "CrowdStrike is proud to be named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. We believe this recognition clearly demonstrates the power of the CrowdStrike Falcon® […]", "pageAuthor" : "Sunil Frida", "pageAuthorLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/author.sunil-frida.html", "pageCategory" : "Endpoint Security & XDR", "pageCategoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.endpoint-protection.html", "pageHeadlineTitle" : "CrowdStrike Named a Leader in 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms", "ctaLabel" : "Endpoint Security & XDR", "viewNeeded" : true }, { "pageTitle" : "Recognizing the Resilience of the CrowdStrike Community", "pagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024.html", "thumbnailPath" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/0924_04_Post-Fal.Con_Resilient-by-Design_03B", "publishDate" : "September 25, 2024", "description" : "Our annual Fal.Con user conference is always one of the highlights of my year because it’s a chance to spend time with some of my favorite people: our customers and partners. This year’s event has spe[…]", "pageAuthor" : "George Kurtz", "pageAuthorLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/author.george-kurtz.html", "pageCategory" : "Executive Viewpoint", "pageCategoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.executive-viewpoint.html", "pageHeadlineTitle" : "Recognizing the Resilience of the CrowdStrike Community", "ctaLabel" : "Executive Viewpoint", "viewNeeded" : true }, { "pageTitle" : "CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection", "pagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/driving-cybersecurity-forward-new-innovations-fal-con-2024.html", "thumbnailPath" : "https://assets.crowdstrike.com/is/image/crowdstrikeinc/0824_02_Fal.Con-Preview_MS-1024x674", "publishDate" : "September 18, 2024", "description" : "Today’s threat landscape is defined by adversaries’ increasing speed and quickly evolving tactics. Now more than ever, it is imperative organizations unify and accelerate their security operations to […]", "pageAuthor" : "Michael Sentonas", "pageAuthorLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/author.michael-sentonas.html", "pageCategory" : "Executive Viewpoint", "pageCategoryLink" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/category.executive-viewpoint.html", "pageHeadlineTitle" : "CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection", "ctaLabel" : "Executive Viewpoint", "viewNeeded" : true } ] }, { "children" : [ { "externalLink" : "false", "id" : "teaser-en-us-subscribe-08-19-2024", "text" : "Sign Up", "url" : "modal:subscribe" } ], "componentInfo" : { }, "id" : "teaser-en-us-subscribe-08-19-2024" }, { "children" : [ { "externalLink" : "false", "id" : "teaser-en-us-see-crowdstrike-falcon®-i-10-01-2024", "text" : "See Demo", "url" : "https://www.crowdstrike.com/products/demos/" } ], "componentInfo" : { }, "id" : "teaser-en-us-see-crowdstrike-falcon®-i-10-01-2024" }, { "nextPagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/fal-con-europe-2024.html", "previousPagePath" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/driving-cybersecurity-forward-new-innovations-fal-con-2024.html", "previousPageTitle" : "CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection", "nextPageTitle" : "Fal.Con Europe: Bringing the Power of the Crowd to Amsterdam", "componentInfo" : { }, "id" : "previousnext-en-us-05-08-2024" }, { "componentInfo" : { }, "id" : "logo-en-us-02-10-2025" }, { "facebookUrl" : "https://www.facebook.com/CrowdStrike/", "linkedInUrl" : "https://www.linkedin.com/company/crowdstrike", "youtubeUrl" : "http://www.youtube.com/user/CrowdStrike", "twitterUrl" : "https://twitter.com/CrowdStrike", "componentInfo" : { } }, { "children" : [ { "externalLink" : "\"false\"", "id" : "list-en-us-02-10-2025", "text" : "Copyright © 2025 CrowdStrike" }, { "externalLink" : "\"false\"", "id" : "list-en-us-02-10-2025", "text" : "Privacy", "url" : "https://www.crowdstrike.com/privacy-notice/" }, { "externalLink" : "\"false\"", "id" : "list-en-us-02-10-2025", "text" : "Request Info", "url" : "https://www.crowdstrike.com/services/request-information/" }, { "externalLink" : "\"false\"", "id" : "list-en-us-02-10-2025", "text" : "Blog", "url" : "https://www.crowdstrike.com/blog/" }, { "externalLink" : "\"false\"", "id" : "list-en-us-02-10-2025", "text" : "Contact Us", "url" : "https://www.crowdstrike.com/contact-us/" }, { "externalLink" : "\"false\"", "id" : "list-en-us-02-10-2025", "text" : " 1.888.512.8906" }, { "externalLink" : "\"false\"", "id" : "list-en-us-02-10-2025", "text" : "Accessibility", "url" : "#" } ], "componentInfo" : { } } ], "version " : "1.0", "page" : { "pageInfo" : { "pageType" : "blog child", "publisher" : "crowdstrike.com", "language" : "en_US", "destinationURL" : "https://www.crowdstrike.com/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024/", "sysEnv" : "prod", "issueDate" : "2024-09-30T20:56:06Z00", "pageID" : "/content/crowdstrike-www/locale-sites/us/en-us/blog/george-kurtz-resilient-by-design-fal-con-2024", "pageName" : "Recognizing the Resilience of the CrowdStrike Community", "breadcrumbs" : [ "CrowdStrike.com", "Locale Sites", "United States", "CrowdStrike: Definitive AI-native cybersecurity platform", "Blog", "Recognizing the Resilience of the CrowdStrike Community" ], "effectiveDate" : "2024-09-30T20:56:06Z00" }, "attributes" : { "template" : "crowdstrike-blog-detail-page-v2", "tags" : [ ] }, "category" : { "primaryCategory" : "blog child" } }, "event" : [ { "eventName" : "Page Load", "eventAction" : "pageLoad" } ] } } </script> </div> </body> </html>