AI & Machine Learning
CrowdStrike Launches Agentic AI Innovations to Fortify the AI-Native SOC
The pace and prevalence of adversarial AI is only accelerating — and organizations must harness the power of AI to stop them. CrowdStrike is building the tools they need to do it. Our latest innovatio[…]
CrowdStrike Partners with Google Cloud to Advance AI-Native Integration with MCP
CrowdStrike has joined Google Cloud in a shared commitment to foster an open and interoperable AI security ecosystem through the Model Context Protocol (MCP), which is built to transform how AI models[…]
CrowdStrike Research: Securing AI-Generated Code with Multiple Self-Learning AI Agents
CrowdStrike data scientists have undertaken research into developing innovative new self-learning, multi-agent AI systems that employ Red Teaming capabilities This new approach, presented at the NVIDI[…]
CrowdStrike Secures AI Development with NVIDIA
We’re excited to share that CrowdStrike Falcon® Cloud Security now offers enhanced tools to help secure artificial intelligence (AI) development, simplify AI security posture management, and quickly r[…]
CrowdStrike Researchers Develop Custom XGBoost Objective to Improve ML Model Release Stability
Extreme Gradient Boosting (XGBoost) is a valuable tool for training machine learning (ML) classifiers, which often come with the problem of surprise false positives (FPs) and false negatives (FNs). Su[…]
Byte Back: Next-Generation Malware Classification Using Binary Transformers
CrowdStrike researchers have developed a next-gen method to train byte-based Transformer blocks that help models “understand” malware files rather than rely on detecting the presence of markers During[…]
CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage
AI has become both a powerful ally and a formidable weapon in today’s cybersecurity landscape. While AI enables security teams to detect and neutralize threats with unmatched speed and precision, adve[…]
Caught in the Act: CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections
Early in the cyberattack kill chain, reconnaissance enables attackers to assemble critical network information to plan a tailored attack strategy. In this phase, adversaries aim to map out networks an[…]
The Evolving Role of AI in Data Protection
Each year, Data Protection Day marks an opportunity to assess the state of privacy and security in the midst of technological innovation. This year’s inflection point follows a robust dialogue on AI f[…]
CrowdStrike Researchers Explore Contrastive Learning to Enhance Detection Against Emerging Malware Threats
CrowdStrike research shows that contrastive learning improves supervised machine learning results for PE (Portable Executable) malware Applying self-supervised learning to PE files enhances the effect[…]
80% of Cybersecurity Leaders Prefer Platform-Delivered GenAI for Stronger Defense
Adversaries are advancing faster than ever, exploiting the growing complexity of business IT environments. In this high-stakes threat landscape, generative AI (GenAI) is a necessity. With organization[…]
CrowdStrike Partners with MITRE Center for Threat-Informed Defense to Launch Secure AI Project
The goal of the Secure AI project is to fortify the security of AI-enabled systems and address the unique vulnerabilities and novel adversary attacks they face Its results were used to expand MITRE AT[…]
Protect Your Weakest Link: New Account Linking Capabilities Use AI to Thwart Identity-Based Attacks
As networks become increasingly distributed, user identities are becoming a top adversary target. CrowdStrike’s 2024 Threat Hunting Report and 2024 Global Threat Report state 5 of the top 10 MITRE tac[…]
CrowdStrike Unveils AI Innovations to Expedite Security Operations and Upgrade the Analyst Experience
Modern cybersecurity is a game of speed. With attacks now happening in mere minutes, the agility with which security teams can detect and disrupt adversaries can make the difference between being the […]
AI Innovation in the Spotlight at Fal.Con 2024
Every year, the role of AI in cybersecurity grows more prominent. This is especially true in the security operations center (SOC), where AI-native detection and GenAI-fueled workflows are advancing cy[…]
New Charlotte AI Innovations Enable Prompt Collaboration and Demystify Script Analysis
Since CrowdStrike® Charlotte AI™ became generally available, we’ve seen firsthand how genAI can transform security operations, enabling teams to save hours across time-sensitive tasks and accelerate r[…]
Falcon Fusion SOAR and Machine Learning-based Detections Automate Data Protection Workflows
Time is of the essence when it comes to protecting your data, and often, teams are sifting through hundreds or thousands of alerts to try to pinpoint truly malicious user behavior. Manual triage and r[…]
Deploying the Droids: Optimizing Charlotte AI’s Performance with a Multi-AI Architecture
Over the last year there has been a prevailing sentiment that while AI will not necessarily be replacing humans, humans who use AI will replace those that don’t. This sentiment also applies to the nex[…]
Five Questions Security Teams Need to Ask to Use Generative AI Responsibly
Since announcing Charlotte AI, we’ve engaged with many customers to show how this transformational technology will unlock greater speed and value for security teams and expand their arsenal in the fig[…]
CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence
The major news in technology policy circles is this month’s release of the long-anticipated Executive Order (E.O.) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. […]
Introducing Charlotte AI, CrowdStrike’s Generative AI Security Analyst: Ushering in the Future of AI-Powered Cybersecurity
CrowdStrike has pioneered the use of artificial intelligence (AI) since we first introduced AI-powered protection to replace signature-based antivirus over 10 years ago, and we’ve continued to deeply […]
CrowdStrike Advances the Use of AI to Predict Adversary Behavior and Significantly Improve Protection
CrowdStrike is announcing new AI-powered indicators of attack (IoA) models, designed to combat advanced adversary tradecraft, available later this year. AI-powered IoAs use machine intelligence to sto[…]
Leveraging the Dark Side: How CrowdStrike Boosts Machine Learning Efficacy Against Adversaries
Adversarial machine learning (ML) attacks can compromise a ML model’s effectiveness and ability to detect malware through strategies such as using static ML evasion to modify known malware variants Cr[…]
Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Malware gets the headlines, but the bigger threat is hands-on-keyboard adversary activity which can evade traditional security solutions and present detection challenges Machine learning (ML) can pred[…]
From Data to Deployment: How Human Expertise Maximizes Detection Efficacy Across the Machine Learning Lifecycle
Machine learning models trained on both human expertise and machine intelligence are essential to synthesizing today’s volume of intelligence and maximizing model efficacy CrowdStrike’s machine learni[…]
Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever
AI-powered indicators of attack (IOAs) are the latest evolution of CrowdStrike’s industry-first IOAs, expanding protection with the combined power of cloud-native machine learning and human expertise […]
How CrowdStrike’s Machine Learning Model Automation Uses the Cloud to Maximize Detection Efficacy
The CrowdStrike Falcon®® platform takes full advantage of the power of the CrowdStrike Security Cloud to reduce high-cost false positives and maximize detection efficacy to stop breaches CrowdStrike c[…]
How Human Intelligence Is Supercharging CrowdStrike's Artificial Intelligence
The CrowdStrike Security Cloud processes over a trillion events from endpoint sensors per day, but human professionals play a vital role in providing structure and ground truth for artificial intellig[…]
A Primer on Machine Learning in Endpoint Security
Although machine learning (ML) isn’t a new concept — it actually dates back to the origins of the computer itself — it has received more attention lately as cybersecurity vendors increasingly extol it[…]