Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

17 results found

Partner POV | AI Tool Poisoning: How Hidden Instructions Threaten AI Agents

AI tool poisoning exploits vulnerabilities in tool descriptions, leading AI agents to perform unintended actions, risking data breaches and unauthorized access. This article explores the mechanics of tool poisoning, its various forms, and strategies for defense, emphasizing the critical need for robust security measures to protect AI systems.
Partner Contribution
•Feb 10, 2026

Partner POV | CrowdStrike + NVIDIA: Redefining Cybersecurity for the Generative AI Era

In a rapidly evolving cyber landscape, legacy security methods falter against sophisticated threats. CrowdStrike and NVIDIA's collaboration harnesses AI to revolutionize threat detection, offering swift, AI-assisted protection. By merging advanced analytics with accelerated computing, they empower organizations to outpace adversaries, transforming enterprise data into actionable security insights for a safer digital future.
Partner Contribution
•Sep 26, 2025

Partner POV | Transform AWS Security Operations with Falcon Next-Gen SIEM

CrowdStrike, in collaboration with AWS, enhances cloud security with Falcon Next-Gen SIEM, offering simplified onboarding, flexible pricing, and expanded integrations. This innovation empowers SOC teams to efficiently transform AWS data into actionable intelligence, leveraging AI and automation for comprehensive threat detection and response, while optimizing costs and scalability in cloud environments.
Partner Contribution
•Feb 3, 2026

Partner POV | CrowdStrike and Rubrik Join Forces to Defend Attacks on Data

Rubrik & CrowdStrike merge data insights with threat intelligence in once place to defend your sensitive data
Partner Contribution
•Apr 18, 2024

Partner POV | Better Together: ExtraHop + Crowdstrike

CrowdStrike's integration with ExtraHop RevealX combines EDR and NDR for real-time traffic analysis, AI-driven insights, and automated threat response, enhancing security without disrupting operations.
Partner Contribution
•Mar 26, 2025

Partner POV | How Okta, CrowdStrike, and Zscaler deliver end-to-end Zero Trust

This partnership addresses challenges like digital transformation, distributed workforces, and resource constraints by leveraging AI and specialized expertise to improve security outcomes.
Partner Contribution
•Aug 21, 2024

Partner POV | Inside CrowdStrike's Science-Backed Approach to Building Expert SOC Agents

AI-enabled adversaries challenge traditional SOCs, necessitating AI agents for effective triage and response. CrowdStrike's Charlotte AI leverages expert data, scientific benchmarking, and continuous feedback to deliver analyst-grade decision-making. This approach transforms SOC operations, enhancing accuracy and efficiency while maintaining human oversight and adaptability against evolving threats.
Partner Contribution
•Jan 20, 2026

Partner POV | CrowdStrike's Journey in Customizing NVIDIA Nemotron Models

CrowdStrike and NVIDIA collaborate to enhance security AI by fine-tuning Nemotron models for real-world SOC workflows. Leveraging millions of CQL queries and synthetic data, they develop a natural language-to-CQL model, improving accuracy and efficiency. This partnership exemplifies domain-specific AI adaptation, advancing autonomous security operations and threat detection.
Partner Contribution
•Jan 15, 2026

Partner POV | Assessing Misconfigurations at Scale with Falcon Exposure Management

Misconfigurations often fly under the radar, but overlooking these risks can open the door to adversaries. Learn how to simplify configuration management for large environments.
Partner Contribution
•Mar 2, 2025

Partner POV | CrowdStrike Drives Cybersecurity Forward with New Innovations

Explore CrowdStrike's new product capabilities built to fortify organizations' defenses with comprehensive protection across key layers of their environment.
Partner Contribution
•Sep 26, 2024

Partner POV | CrowdStrike 2025 Global Threat Report

The CrowdStrike 2025 Global Threat Report details the threat landscape of the past year, the key threats and trends we observed, and the adversaries behind them to inform and prepare businesses for the year ahead.
Partner Contribution
•Mar 3, 2025

Partner POV | Fortinet and CrowdStrike Joint Solution

Delivering AI-powered protection, adaptive zero-trust access, and accelerated threat detection and response across your entire digital infrastructure
Partner Contribution
•Aug 25, 2025

CrowdStrike

CrowdStrike solutions help strengthen security posture for customers, with machine learning, AI, and proactive threat hunting providing an easy turnkey solution.

112 Followers

At a glance

46Total
17Articles
10Blogs
7Labs
5Videos
2Briefings
2Case Studies
2Events
1Learning Path
What's related
  • Security
  • Security Operations
  • Endpoint Security
  • AI Security
  • Cloud
  • Cloud Security
  • Blog
  • ATC
  • Cyber Range
  • Cybersecurity Risk & Strategy
  • Network Security
  • AI & Data
  • CrowdStrike Falcon Insight
  • CrowdStrike Falcon X
  • Identity and Access Management
  • Applied AI
  • Whole-of-state cybersecurity
  • AI Proving Ground
  • Cloud Marketplace
  • Cyber Resilience

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies