Jamie Gale
Cloud Logs: The Unsung Heroes of Detection and Response
Cyberattackers are exploring stealthier and more sophisticated methods to infiltrate cloud environments. From exploiting misconfigurations to leveraging stolen credentials, adversaries are skilled at […]
Shift Left, Measure Right: Assessing the Efficacy of Application Security in the Age of CI/CD
As organizations continue to invest in developing cloud-native applications, they must also invest in securing them. Industry data shows application security is a growing market with investments predi[…]
Porter Airlines Consolidates Its Cloud, Identity and Endpoint Security with CrowdStrike
As Porter Airlines scaled its business, it needed a unified cybersecurity platform to eliminate the challenges of juggling multiple cloud, identity and endpoint security products. Porter consolidated […]
Key Findings from CrowdStrike’s 2024 State of Application Security Report
As organizations shift their applications and operations to the cloud and increasingly drive revenues through software, cloud-native applications and APIs have emerged among the greatest areas of mode[…]