CrowdStrike this week acquired Flow Security to add data security posture management (DSPM) to its portfolio, as well as Dell Technologies' managed detection and response service integrated with the core CrowdStrike Falcon enhanced detection and response (XDR) platform. agreed to provide.
These additions come as CrowdStrike uses a generative artificial intelligence (AI) tool called Charlotte AI and an IT service management (ITSM) platform based on the same agent software that CrowdStrike uses to collect security telemetry data. This comes on the heels of the general availability of Falcon for IT. .
CrowdStrike also updated Falcon Data Protection to add features that prevent sensitive data from being accidentally shared with generative artificial intelligence (AI) platforms.
As the volume and sophistication of threats continues to increase, Raj Rajamani, Head of Product at CrowdStrike, believes that as the volume and sophistication of threats continues to increase, there is a need to centralize the management of both security and IT operations to reduce costs and improve security at the same time. I said one thing is clear. The more siled these teams are within an organization, he added, the easier it is for cybercriminals to exploit weaknesses they discover.
In fact, according to a report from CrowdStrike, the average breakout time from the time an IT environment is compromised to the start of a cyber attack is just 62 minutes. The report also notes that cybercriminals deploy detection tools in just 31 seconds.
The report also noted a sharp increase in interactive intrusions and keyboard activity, as attackers increasingly abuse stolen credentials to gain initial access to targeted organizations. Okay (60%).
At the same time, the report found that intrusions into cloud computing environments increased by 75% year over year.
While it is unclear to what extent the rise in cyberattacks is prompting organizations to integrate cybersecurity tools and platforms, it is clear that many organizations require different strategies. Too many cybersecurity tools can be counterproductive by overwhelming your team with alerts. Additionally, each tool typically requires organizations to pay an annual license fee. As cybersecurity evolves, platforms are emerging that offer many of the same capabilities of these tools through modules integrated into a centralized console.
Of course, many cybersecurity professionals trust one tool more than another, so organizations must decide which features are important. But as business leaders continue to wonder why cybersecurity costs continue to increase despite little apparent progress, many cybersecurity and IT leaders are wondering why the sprawling proliferation of tools They are under further pressure to cut back.
Regardless of the future direction, cybersecurity will become more centralized as organizations seek to leverage artificial intelligence (AI) to improve security. Most of these AI capabilities are only available on cloud platforms that can aggregate enough data to effectively train multiple types of AI models. The average cybersecurity team cannot begin by collecting enough telemetry data to train an AI model, much less hire and retain the data scientists needed to build and maintain the AI model. The challenge, as always, will be persuading business leaders to fund that transition in an uncertain economic climate.
Recent articles by author