Cloud SecurityHIGH

Cloud Security - CrowdStrike Enhances CNAPP with New Features

CRCrowdStrike Blog
CrowdStrikeCNAPPCloud SecurityApplication ExplorerRisk Prioritization
🎯

Basically, CrowdStrike improved its cloud security tools to help businesses better understand and manage risks.

Quick Summary

CrowdStrike has introduced new features to its CNAPP, focusing on adversary-informed risk prioritization. These enhancements are crucial as cloud breaches rise, helping organizations better manage their security risks. By integrating application visibility with infrastructure context, CrowdStrike aims to close critical security gaps and improve response times.

What Happened

CrowdStrike has made significant advancements in its Cloud Native Application Protection Platform (CNAPP) by introducing industry-first capabilities that focus on adversary-informed risk prioritization. This development aims to address the rising concerns regarding cloud security as incidents of cloud breaches continue to escalate. According to the CrowdStrike 2026 Global Threat Report, cloud-related intrusions by state-nexus threat actors surged by 266% in 2025. These new features are designed to help security teams better understand and mitigate risks associated with their cloud environments.

The enhancements come in response to three critical gaps identified in current cloud security practices. First, existing solutions often focus solely on infrastructure without considering how business applications operate within that infrastructure. Second, risk assessments typically ignore adversary behavior, which can lead to misprioritization of threats. Finally, security teams face challenges in connecting risk detections to the configuration changes that caused them, leading to inefficient triage processes.

New CNAPP Innovations for Proactive Security

CrowdStrike's latest innovations aim to fill these gaps by providing a more comprehensive view of cloud risk. One of the standout features is Application Explorer, which integrates application-layer visibility with cloud infrastructure context. This tool allows security teams to see how business applications function across both cloud and on-premises environments, providing insights into dependencies and potential vulnerabilities.

With Application Explorer, organizations can now identify how infrastructure risks impact production applications. For example, if a storage resource is found to have overly permissive access, the tool can reveal which applications connect to that resource and whether they handle sensitive data. This capability is crucial for understanding the potential impact of vulnerabilities on mission-critical applications, such as payment processing systems.

How This Affects Your Cloud Security

The introduction of these features is particularly timely as organizations increasingly adopt cloud-native solutions. By aligning risk assessments with observed adversary behavior, CrowdStrike enables security teams to prioritize remediation efforts effectively. This approach allows organizations to focus on the most relevant threats, rather than wasting resources on theoretical risks that may not be applicable.

Furthermore, the integration of AI-driven applications into the risk assessment process is a significant advancement. CrowdStrike's tools can now discover applications running as machine learning models, identify dependencies on external large language models (LLMs), and map data access. This capability helps organizations detect unapproved AI usage and prevent sensitive data exposure, enhancing overall security posture.

What You Should Do

Organizations should consider adopting CrowdStrike's new CNAPP capabilities to enhance their cloud security strategies. By leveraging tools like Application Explorer, security teams can gain a clearer understanding of their risk landscape and make informed decisions about remediation efforts. It's essential to continuously monitor application behavior and cloud infrastructure to adapt to evolving threats.

In addition, businesses should ensure they are aware of the latest adversary tactics and adjust their security measures accordingly. By staying informed and proactive, organizations can better protect themselves against the rising tide of cloud breaches and maintain the integrity of their data and applications.

🔒 Pro insight: The integration of application-layer risk analysis with adversary behavior is a game changer for proactive cloud security management.

Original article from

CrowdStrike Blog · Jason Williams

Read Full Article

Related Pings

HIGHCloud Security

Scaling Redis - Report URI's Infrastructure Improvements

Report URI is scaling their Redis infrastructure to handle massive telemetry data. They've implemented high availability and optimized connections to improve performance. These changes are essential for maintaining a reliable service as data demands grow.

Scott Helme·
HIGHCloud Security

Cloud Security - Huntress Expands ITDR to Google Workspace

Huntress has launched its ITDR solution for Google Workspace, enhancing cloud security. This comes as identity attacks rise, affecting many organizations. The solution aims to provide better protection against these threats.

IT Security Guru·
HIGHCloud Security

Cloud Security - Mimecast Enhances Incydr for AI Risks

Mimecast has unveiled enhancements to its Incydr platform, focusing on runtime data security for AI and human risks. This is crucial as many companies lack proper security for AI tools. Organizations must adapt to these changes to protect sensitive data effectively.

Help Net Security·
HIGHCloud Security

Cloud Security - Falcon Data Security Enhances Data Protection

CrowdStrike has launched Falcon Data Security to enhance data protection. This tool secures sensitive data across various environments, preventing unauthorized access. As data breaches rise, this solution is vital for safeguarding critical information.

CrowdStrike Blog·
HIGHCloud Security

HP Launches TPM Guard - Defeating Physical TPM Attacks

HP has launched TPM Guard to protect against physical attacks on Trusted Platform Modules. This solution is vital for enterprises using Windows 11. It helps secure sensitive data from being stolen by attackers with physical access. The technology aims to set a new industry standard for device security.

CSO Online·
MEDIUMCloud Security

Cloud - NVIDIA Transfers GPU Orchestration to Community Control

NVIDIA has donated its GPU orchestration driver to the CNCF, allowing the Kubernetes community to manage AI workloads. This empowers developers and enhances collaboration in cloud environments. The move marks a significant step towards open-source innovation in AI infrastructure.

Help Net Security·