Skip to content

Mistake by CrowdStrike potentially risks its hard-earned repute

Defective code released en masse implies that either CrowdStrike neglected to thoroughly test their update prior to its release, or their quality control procedures missed the error, according to industry experts.

Misstep by CrowdStrike jeopardizes its public standing
Misstep by CrowdStrike jeopardizes its public standing

Mistake by CrowdStrike potentially risks its hard-earned repute

In a letter sent to customers on Friday, CrowdStrike CEO George Kurtz addressed the recent global IT outage caused by a defective software update. The letter outlined the company's response to the incident and the measures it is implementing to prevent similar disruptions in the future.

The defect, contained in a CrowdStrike Falcon sensor update, impacted customers running Windows-based systems, causing a significant dent in CrowdStrike's reputation. The magnitude of the bad update was large due to the high number of devices running both CrowdStrike and Windows.

CrowdStrike's approach to rectifying the issue focuses on bolstering traditional detection methods, adopting combined technologies and best practices, and focusing on operational adaptability. These measures aim to shift from reactive incident response towards more proactive and adaptive security postures.

The company is bolstering traditional detection methods with more dynamic and proactive strategies, combining prevention and resilience. This includes integrating AI-based threat monitoring, zero-trust security models, dynamic policy management, and rigorous update testing before release.

In addition, CrowdStrike is adopting combined technologies and best practices such as Cloud-Native Application Protection Platform (CNAPP), Identity and Access Management (IAM), Endpoint Detection and Response (EDR), and Endpoint Isolation to enhance risk reduction.

The company is also focusing on operational adaptability to respond more effectively to incidents and reduce the likelihood of disruptions. This shift towards proactive security postures is a reflection of a broader industry trend post-incident to implement more intelligent, integrated security frameworks rather than relying solely on post-event responses.

Apologies were also issued with recognition of the incident's impact, alongside a commitment to continuous platform strengthening and industry collaboration. CrowdStrike has also publicly rejected some independent outage impact analyses while committing to improvement efforts.

The recovery from this incident is expected to be difficult and not quick. Best practices dictate that software updates should be tested internally then released to a small group of users before they are distributed for production environments.

CrowdStrike ended 2023 with a 14.7% share of the global market for endpoint protection platforms based on revenue, according to Gartner. The company's response and the measures it implements will be crucial in determining its future, according to Eric Grenier, director analyst at Gartner.

Tom Marsland, VP of technology and technical services at Cloud Range, stated that the release of the botched code was preventable. The real test ahead for CrowdStrike will center around the company's response and the measures it implements to mitigate risks of this scale in the future.

CrowdStrike CEO George Kurtz has committed to providing full transparency on the defective update incident. The letter from CrowdStrike CEO George Kurtz emphasizes the company's intention to fortify and improve its update practices.

Any company that sells endpoint protection services to enterprises could potentially benefit from disgruntled CrowdStrike customers, according to Eric Grenier. However, the response and the measures CrowdStrike implements will be key in determining its future success.

  1. CrowdStrike is focusing on operational adaptability to respond more effectively to incidents and reduce the likelihood of disruptions, shifting towards proactive security postures, as highlighted by CEO George Kurtz.
  2. The company's response to the recent global IT outage includes bolstering traditional detection methods, adopting combined technologies and best practices, and focusing on operational adaptability, as outlined in the letter from George Kurtz.
  3. In addition to traditional methods, CrowdStrike is integrating AI-based threat monitoring, zero-trust security models, dynamic policy management, and rigorous update testing before release to prevent similar disruptions in the future.
  4. The company's approach to rectifying the issue also includes adopting combined technologies such as Cloud-Native Application Protection Platform (CNAPP), Identity and Access Management (IAM), Endpoint Detection and Response (EDR), and Endpoint Isolation to enhance risk reduction.

Read also:

    Latest