This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of
computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.Computer SecurityWikipedia:WikiProject Computer SecurityTemplate:WikiProject Computer SecurityComputer Security articles
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of
computers,
computing, and
information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing articles
This article is within the scope of WikiProject United States, a collaborative effort to improve the coverage of topics relating to the
United States of America on Wikipedia. If you would like to participate, please visit the project page, where you can join the ongoing discussions.
This article is within the scope of WikiProject California, a collaborative effort to improve the coverage of the
U.S. state of California on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.CaliforniaWikipedia:WikiProject CaliforniaTemplate:WikiProject CaliforniaCalifornia articles
This article is within the scope of WikiProject Companies, a collaborative effort to improve the coverage of
companies on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.CompaniesWikipedia:WikiProject CompaniesTemplate:WikiProject Companiescompany articles
The
Wikimedia Foundation's
Terms of Use require that editors disclose their "employer, client, and affiliation" with respect to any paid contribution; see
WP:PAID. For advice about reviewing paid contributions, see
WP:COIRESPONSE.
Robertrobert987 (
talk·contribs) has been paid by CrowdStrike on their behalf. Their editing has included contributions to this article. Disclosure made on userpage.
MaryGaulke (
talk·contribs) has been paid by Nobody Media on behalf of CrowdStrike. Disclosures made below and on userpage.
This article was nominated for
deletion on 8 June 2016. The result of
the discussion was nomination withdrawn.
CrowdStrike
The private?? government company needs some explanation, private company? Guess we all know that this is not the case!!!!
The fist section of the information needs to be rewritten.
what is CrowdStrike, and who is paying them, Follow the money, who is supporting them!
What right do private companies have, are they hackers, hacking for the government? A big question, so are they hackers or are they in for the money?
i will rewrite the first section, we now know what they do! We only need to know who is paying them! If the US is is founding them, it's just government! Only governments can do this kind of recherche, or they are just hackers?
Since they are listed on the NASDAQ they are a private sector public company. One owner, telstra, is the largest Australian telecommunications company, but most telstra shareholders would be unaware that telstra owns shares in CrowdStrike. The number of security companies and agencies (some of them government) seem to nullify the savings made through digitization. Last year we had so much trouble with telstra's email that we nearly lost the way to live, and others had big trouble, too. We are having a global outage of massive proportions as we speak because someone couldn't leave things alone, doing an update that was obviously a dud.
2001:8003:A070:7F00:891D:387A:4981:FC9A (
talk)
12:11, 19 July 2024 (UTC)reply
2021 COI edit requests
Part of an edit requested by an editor with a
conflict of interest has been implemented.
Hi, COI editor for CrowdStrike here again, with a few new requests.
In the infobox:
Adding Gregg Marston as a company founder, per the article body. Done
Under "Products", replace "Threat intelligence" with "Security cloud". Here are a few sources on that term:
SDX Central,
CRN,
Security Brief. Done
Updating "sister company" to "subsidiary" as a descriptor for CrowdStrike Services.[4] Done
Updating which provided threat intelligence and attribution to which provided endpoint protection, threat intelligence and attribution per the
source. In that same sentence, I think it may make sense to delete "to nation state actors" and "that are conducting economic espionage and IP theft" so the {{
Better source}} flag can be removed. Done
At end of first paragraph, adding: Since then, the company has launched multiple additional modules for the platform.[5]Not done I feel this is common practice in most businesses, particularly in tech, and it’s understood. This takes the article which already has quite a bit of advertising language a step too close to being marked for improvement.
Add to "Accolades": An
IDC report in July 2020 named CrowdStrike as the fastest-growing endpoint security software vendor.[6]Not done This is clearly advertising for the company, and likely to do more harm to the quality of the article than good. I would suggest to skip it.
@
MaryGaulke: No, my bad, I completely missed it. Had to read a bit about the definition, the citation, and the Crowdstrike portfolio to verify it, but I just added it. Sorry for the delay.
Ferkjl (
talk)
16:39, 6 April 2021 (UTC)reply
References
^"Form 10-K". CrowdStrike. 31 January 2020. Retrieved 13 December 2020.
^"Form 10-Q". CrowdStrike. 31 October 2020. Retrieved 13 December 2020.
Yes, this is absolutely true. They have pushed UNTESTED and BROKEN software to millions of corporate computers, shutting down many companies. — Preceding
unsigned comment added by
108.185.180.195 (
talk)
14:14, 19 July 2024 (UTC)reply
Okay, would you mind providing a source explaining those details? Can't really add those supposed details to the article if nobody knows what said details are, or if there aren't any sources pointing out said details. 🔥HOTm̵̟͆e̷̜̓s̵̼̊s̸̜̃🔥 (
talk・
edits)14:12, 19 July 2024 (UTC)reply
Semi-protected edit request on 20 July 2024
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.
Change the "2024 incident" section title to "2024 Incident", and unindent (?) it so that it is not under the "Acquisitions: 2020–2024" header on the sidebar. This incident seems to now be more notable than the company; the page detailing the incident is already much longer than the page for the company itself.
202.89.148.53 (
talk)
00:21, 20 July 2024 (UTC)reply
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.
The point about "the root cause of this update and the vulnerability of IT systems in this world to an update by a single company needs to be put under focus"
Kniranj (
talk)
18:58, 20 July 2024 (UTC)reply
I think a better way to state the issue would be "an untested update by an incompetent development team that was propagated to critical machines worldwide without benefit of independent review". Or something similar. — Preceding
unsigned comment added by
2600:1700:6AE5:2510:0:0:0:40 (
talk)
17:26, 21 July 2024 (UTC)reply
I am not denying Crowdstrike has a poor track record of software quality, I work in information security for a large Crowdstrike customer and know this to be true. However your additions are
original research that draw a conclusion that is not supported by reliable sources.
Flag them as unreliable source if you feel that way. Depending on who you ask, you can get someone to say the same about almost any citation/reference in Wikipedia. Such a flag is fair and lets the reader draw their own conclusions. If you think I errantly drew a conclusion not supported by the citations or prior text, feel free to suggest edits to that.
Jericho347 (
talk)
03:00, 25 July 2024 (UTC)reply
This
edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.
Change the lead sentence in the "Severe Outage Incidents" section from "CrowdStrike software has a history of causing serious outages on various platforms" to the more neutral "CrowdStrike software has been implicated in several major outages across various platforms."
202.89.148.53 (
talk)
05:15, 23 July 2024 (UTC)reply
The cost of the problem for Fortune 500 companies (excluding Microsoft) has been estimated at $5.4 billion. Such a high cost should be included in the article.
I'd like to suggest the "July 2024 incident" section on the $10 UberEats gift cards to be updated to state that it was offered to "teammates and partners" (not "customers"), to accurately reflect the source.
68.0.145.194 (
talk)
01:38, 28 July 2024 (UTC)reply