Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain privacy and comply with stringent regulatory requirements. Today’s … [Read more...] about 5 Best Practices for Securing Azure Resources
News
Apple Jing’an to welcome its first customers Thursday, March 21, in Shanghai
March 18, 2024 PRESS RELEASE Apple Jing’an to welcome its first customers this Thursday, March 21, in Shanghai The new Apple Store in Shanghai features Apple’s best lineup of products ever, special Today at Apple sessions that celebrate local culture, and a team of more than 150 ready to offer excellent service to customers SHANGHAI Apple today previewed Apple Jing’an, … [Read more...] about Apple Jing’an to welcome its first customers Thursday, March 21, in Shanghai
Pure Storage Accelerates Enterprise AI Adoption to Meet Growing Demands with NVIDIA AI
Pure Storage® (NYSE: PSTG), the IT pioneer that delivers advanced data storage technology and services, today announced new validated reference architectures for running generative AI use cases, including a new NVIDIA OVX-ready validated reference architecture. As a leader in AI, Pure Storage, in collaboration with NVIDIA, is arming global customers with a proven framework to … [Read more...] about Pure Storage Accelerates Enterprise AI Adoption to Meet Growing Demands with NVIDIA AI
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Mar 18, 2024NewsroomVulnerability / Threat Mitigation Fortra has released details of a now-patched critical security flaw impacting its FileCatalyst file transfer solution that could allow unauthenticated attackers to gain remote code execution on susceptible servers. Tracked as CVE-2024-25153, the shortcoming carries a CVSS score of 9.8 out of a maximum of 10. "A directory … [Read more...] about Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
CrowdStrike and Intel Research to Advance Endpoint Security
At CrowdStrike, we are relentlessly researching and developing new technologies to outpace new and sophisticated threats, track adversaries’ behavior and stop breaches. As today’s adversaries continue to become faster and more advanced, the speed of enterprise detection and response is paramount. It is also a challenge for today’s organizations, which face mounting attack … [Read more...] about CrowdStrike and Intel Research to Advance Endpoint Security
Switching from the Java High Level Rest Client to the new Java API Client
I'm often seeing questions on discuss related to the Java API Client usage. For this, in 2019, I started a GitHub repository to provide some code examples that actually work and answer the questions asked by the community.Since then, the High Level Rest Client (HLRC) has been deprecated and the new Java API Client has been released.In order to keep answering questions, I needed … [Read more...] about Switching from the Java High Level Rest Client to the new Java API Client
Byte-sized Swift: Building Tiny Games for the Playdate
I’m excited to share swift-playdate-examples, a technical demonstration of using Swift to build games for Playdate, a handheld game system by Panic. Why Swift? Swift is widely known as the modern language for app development on Apple devices. However, over the course of its first decade, it has grown into a versatile, multi-platform language targeting use cases where … [Read more...] about Byte-sized Swift: Building Tiny Games for the Playdate
State of Wyoming Looks to Expand CrowdStrike Protections Statewide
With its wild beauty, favorable tax laws and growing tech scene, the State of Wyoming is experiencing a surge in business growth. But with this prosperity comes a rise in cyber risk due to the expanding commerce platforms and digital infrastructure needed to support it. “We’ve had several large tech companies relocate to Wyoming recently,” explained Jason Strohbehn, Deputy CISO … [Read more...] about State of Wyoming Looks to Expand CrowdStrike Protections Statewide
The Anatomy of an ALPHA SPIDER Ransomware Attack
ALPHA SPIDER is the adversary behind the development and operation of the Alphv ransomware as a service (RaaS). Over the last year, ALPHA SPIDER affiliates have been leveraging a variety of novel techniques as part of their ransomware operations. CrowdStrike Services has observed techniques such as the usage of NTFS Alternate Data Streams for hiding a reverse SSH tool, … [Read more...] about The Anatomy of an ALPHA SPIDER Ransomware Attack
Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike
When Tahir Ali became CTO and CISO at Montage Health in 2021, he inherited a unique set of cybersecurity challenges. For one, the healthcare sector was getting bombarded with attacks, including distributed denial of service (DDoS), phishing and social engineering attacks. At the same time, the California-based nonprofit healthcare system was integrating more networked medical … [Read more...] about Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike