logo
CrowdStrike Falcon Cloud Security Available On OCI

CrowdStrike Falcon Cloud Security Available On OCI

CrowdStrike has announced it is bringing the power of CrowdStrike Falcon Cloud Security to Oracle Cloud Infrastructure (OCI).
Cloud intrusions increased 75% last year, highlighting the challenges security teams face with an expanding cloud attack surface and the increasing complexity of managing numerous disjointed tools. Stopping cloud breaches requires a modern platform that unifies visibility and protection across every attack path in today's hybrid and multi-cloud environments. Falcon Cloud Security combines advanced cloud detection and response (CDR) capabilities with the most comprehensive CNAPP on the market. It provides customers with a single, unified platform that helps secure applications, data, identities, AI models and SaaS environments across all major cloud providers, delivering complete multi-cloud protection.
'Organizations need a unified platform for cloud security — not a patchwork of solutions that fail to stop threats,' said Daniel Bernard, chief business officer, CrowdStrike. 'Today's cloud security landscape is fragmented, forcing businesses to manage too many point products that increase costs, complexity and risk. CrowdStrike and Oracle are changing that. With Falcon Cloud Security supported on OCI, organizations get one platform for complete cloud protection.'
'Security should never be an afterthought especially in this rapidly evolving AI landscape,' said Mahesh Thiagarajan, executive vice president, Oracle Cloud Infrastructure. 'With Falcon Cloud Security supported on OCI, customers gain access to a unified platform to help secure cloud workloads.' 0 0

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Zscaler's Acquisition of Red Canary Signals a New Era in AI-Driven Cybersecurity
Zscaler's Acquisition of Red Canary Signals a New Era in AI-Driven Cybersecurity

Arabian Post

time28-05-2025

  • Arabian Post

Zscaler's Acquisition of Red Canary Signals a New Era in AI-Driven Cybersecurity

Zscaler has announced its intention to acquire Red Canary, a leading Managed Detection and Response provider, in a strategic move aimed at enhancing its capabilities in AI-powered cybersecurity. This acquisition is poised to bolster Zscaler's position in the cybersecurity landscape, particularly in the realm of AI-driven threat detection and response. The integration of Red Canary's MDR expertise with Zscaler's Zero Trust Exchange platform is expected to provide organizations with a more robust and proactive security posture. Red Canary's proficiency in threat detection and response complements Zscaler's existing AI and machine learning capabilities, enabling more efficient identification and mitigation of cyber threats. Zscaler's Zero Trust Exchange platform, which processes over half a trillion daily transactions, serves as the foundation for its AI-driven security solutions. The platform's scalability and real-time analysis capabilities are instrumental in delivering advanced threat detection and prevention. The acquisition of Red Canary is anticipated to further enhance these capabilities, providing deeper insights into security incidents and facilitating faster response times. ADVERTISEMENT The cybersecurity industry is witnessing a significant shift towards AI and machine learning to combat increasingly sophisticated threats. Zscaler's acquisition of Red Canary aligns with this trend, reflecting a commitment to leveraging AI for more effective security operations. By integrating Red Canary's MDR services, Zscaler aims to offer a more comprehensive security solution that addresses the evolving needs of organizations. This acquisition also underscores the growing importance of partnerships and integrations in the cybersecurity sector. Zscaler has previously collaborated with companies like CrowdStrike to enhance its AI and Zero Trust capabilities. The addition of Red Canary to its portfolio signifies a continued focus on expanding its ecosystem to provide holistic security solutions. The integration of Red Canary's services is expected to be seamless, given both companies' emphasis on cloud-native architectures and AI-driven approaches. This synergy is likely to result in improved threat detection accuracy, reduced response times, and enhanced overall security efficacy for clients. As cyber threats continue to evolve, organizations are seeking security solutions that are not only reactive but also predictive. The combination of Zscaler's AI capabilities with Red Canary's MDR expertise positions the company to meet this demand, offering proactive threat hunting and real-time response mechanisms.

Check Point Acquires Veriti
Check Point Acquires Veriti

Channel Post MEA

time28-05-2025

  • Channel Post MEA

Check Point Acquires Veriti

AI-fueled attacks and hyperconnected IT environments have made threat exposure one of the most urgent cybersecurity challenges facing enterprises today. In response, Check Point Software Technologies has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. 'The acquisition of Veriti marks a significant step toward realizing our hybrid mesh security vision,' said Nadav Zafrir, CEO at Check Point Software Technologies. 'It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape.' AI has brought cyber security to a tipping point, enabling the launch of attacks at scale. At the same time, enterprises are hyperconnected, with assets spread across clouds, datacenters, and endpoints, vastly expanding their attack surface. Traditional reactive security is too slow. Veriti continuously identifies, prioritizes, and remediates risk across your multi-vendor environment through automated patching and collaborative threat intelligence, all without disrupting business. Founded in 2021, Veriti pioneered the Preemptive Exposure Management (PEM) category—actively discovering and mitigating risks across siloed tools. Veriti continuously monitors logs, threat indicators, and vulnerabilities identified across the environment and propagates protections in real time. With integrations into over 70 vendors, it empowers security teams to detect, understand, and prevent attacks without delay. Core capabilities Veriti brings to the Check Point Infinity Platform: Automated, cross-vendor virtual patching: Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes. Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes. Real-time threat intelligence enforcement: Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response. Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response. Seamless integration with 70+ security vendors: Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market. Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market. Stronger synergy with Wiz: Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz. Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz. Safe, context-aware remediation: Veriti analyzes each customer's environment, including exposures, configurations, and existing protections, to apply the right controls safely, and without operational impact. 'Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines,' said Adi Ikan, CEO and co-founder of Veriti. 'We founded Veriti to help organizations not just see risk, but remediate it safely, at scale, and most importantly – without disruption. By joining Check Point, we're accelerating that mission. Together, we'll help organizations reduce their exposure faster through the security tools they already trust.' Following the closure of the transaction, Veriti's capabilities will be integrated into the Check Point Infinity Platform as part of the Threat Exposure and Risk Management offering. Combined with the recently added External Risk Management (ERM) solution, Veriti enhances Check Point's ability to deliver complete risk lifecycle coverage—proactively managing both internal and external exposures across the entire attack surface. The closing of the transaction is subject to the customary closing conditions and is expected to occur by the end of Q2 2025. 0 0

CrowdStrike highlights AI innovations shaping cyber defence at GISEC 2025
CrowdStrike highlights AI innovations shaping cyber defence at GISEC 2025

Tahawul Tech

time20-05-2025

  • Tahawul Tech

CrowdStrike highlights AI innovations shaping cyber defence at GISEC 2025

Yassin Watlal, Head of System Engineering and Solutions Architect META at CrowdStrike, shares key takeaways from GISEC 2025, shedding light on AI-driven cyber threats and defense innovations. Dubai— During GISEC Global 2025, discussions centered on Artificial Intelligence (AI) and its transformative impact on cyber threats. Yassin Watlal, Head of System Engineering and Solutions Architect META at CrowdStrike, offered insights to into the growing sophistication of cyber attackers using AI. Watlal explored the evolving strategies to counter these advanced threats, from AI-enhanced phishing attacks to insider threats like Famous Chollima. Watlal shared valuable perspectives on how businesses could secure their systems and adapt to rapid technological innovations, addressing the evolving cybercrime landscape, AI's role in defense, and practical security measures to mitigate risks. Interview Excerpts:How was GISEC this year compared to last year, would you like to share some insights?GISEC Global 2025 fostered significant engagement and insightful discussions this year, particularly focusing on the profound ways in which Artificial Intelligence (AI) is reshaping the landscape of cyber threats. Attendees actively participated in exploring the evolving tactics of threat actors leveraging AI, as well as the defensive strategies and innovative solutions being developed to counter these sophisticated attacks. The conversations delved into the implications of AI for various aspects of cybersecurity, including threat detection, incident response, vulnerability management, and security automation. The level of engagement underscored the collective interest and concern within the cybersecurity community regarding the transformative impact of AI. What are the key findings from the 2025 GTR that you would like to share with us? Current threat actors possess significant funding and meticulously planned objectives in their campaigns. A notable emphasis on identity threats has been observed, evidenced by a 50% increase in dark web advertisements offering compromised credentials. This has led to expedited attacks, with an average breakout time of 48 minutes, defined as the time for initial machine infection and lateral movement. The fastest recorded breakout time was 51 seconds. What is the role of Gen AI in modern cybercrime? AI is utilised by cyber attackers to enhance their attacks, integrating it as a novel component within their global arsenal. Generative AI is primarily employed to refine emails prior to launching phishing campaigns, thereby improving their authenticity and appeal to recipients. Consequently, a significant increase in click-through rates has been observed, with AI-generated emails achieving a 54% click-through rate compared to a 14% rate for human-authored emails. This technology also reduces the skill threshold required for less sophisticated threat actors to engage in malicious activities. Can you tell us more about the insider threats like Famous Chollima? And what are some of the mitigation strategies companies can adopt? The threat actor group Famous Chollima, based in North Korea, employs artificial intelligence to generate fraudulent applications, LinkedIn profiles, and candidate personas, meticulously crafting them to appear highly credible and attractive to recruiters and human resource personnel, aiming to secure employment. Furthermore, during the interview process, they utilize generative AI to formulate responses to questions, enabling them to successfully pass interviews. 'Instances have been reported wherein individuals associated with this group were hired, received company-issued laptops through intermediaries, and performed assigned tasks, effectively gaining insider access.' Can you tell us more about the companies that can secure cloud and hybrid environments? AI-native platform, such as the CrowdStrike Falcon platform, is crucial for effective cybersecurity. Integrating AI natively allows for the realization of its full benefits, particularly in enabling responses at machine speed. Given that attacks materialize rapidly, it is imperative to respond with equal speed. This ensures the ability to maintain a comprehensive understanding of the situation and effectively address threats in a timely manner. What did CrowdStrike exhibit at this year at GISEC? We showcased our latest innovations, our Falcon platform, discussed Charlotte AI, our generative AI offering, and highlighted products that enhance the ecosystem. What are the new technologies that will be integrated by CrowdStrike in the field of cybersecurity? Artificial intelligence is progressively being integrated into various solutions, exemplified by the detection triage facilitated by Charlotte AI and the comprehensive agentic API, which significantly enhances efficiency for cybersecurity analysts. This implementation results in substantial time savings, approximately 40 hours per week for the team, by enabling the agentic AI to effectively differentiate between true positives and false positives, thus expediting response times and optimizing the deployment of AI in the defense strategy. How is cybersecurity being integrated with this rapid technological innovation, and what security measures should businesses adopt in response? Our focus is on ensuring resilience and maintaining a proactive stance against threats. We aim to alleviate routine operational burdens, thereby mitigating risks for our clients. All our efforts are directed towards preventing breaches and safeguarding customer interests by streamlining operational processes traditionally associated with legacy systems. We believe Agentic AI should be deployed to handle these tasks. Could you provide tips for best security practices? We have observed attacks such as LLM jacking. When deploying AI, it is imperative to secure it throughout the deployment process, rather than deploying without security considerations. It is necessary to ensure the security of these new application layers. Regarding LLM jacking, if threat actors obtain cloud credentials, they can log in and execute queries within a subscribed LLM. This can result in increased costs and potential data exposure. Data could be compromised, and private knowledge could be extracted through techniques such as prompt injection. Securing AI and this new application layer is of significant importance. Crowdstrike can provide assistance in this regard.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store