{"id":2845,"date":"2025-10-05T03:07:34","date_gmt":"2025-10-05T03:07:34","guid":{"rendered":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/"},"modified":"2025-10-05T03:07:34","modified_gmt":"2025-10-05T03:07:34","slug":"crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference","status":"publish","type":"post","link":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/","title":{"rendered":"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference"},"content":{"rendered":"<p><center><\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" data-src=\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png\" alt=\"\" style=\"--smush-placeholder-width: 400px; --smush-placeholder-aspect-ratio: 400\/400;width:650px;height:auto\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/figure>\n<p><\/center><\/p>\n<h2>Introduction: A Bold Leap Toward Autonomous Cybersecurity<\/h2>\n<p>CrowdStrike made waves at Fal.Con 2025 with its intensified focus on autonomous cybersecurity, fortified by the strength of its Falcon platform and cutting-edge AI capabilities. Taking the lessons learned from the global outage that rocked enterprises the previous year, CrowdStrike is accelerating its mission to deliver resilient, scalable, and intelligent cyber defense solutions that can operate proactively\u2014even autonomously.<\/p>\n<h2>A Post-Outage Vision: Resilience and Autonomy<\/h2>\n<p>At the heart of this announcement was CEO George Kurtz, who emphasized the critical importance of cybersecurity platforms that don\u2019t just react but anticipate and autonomously neutralize threats. The 2024 outage served as a wake-up call, underscoring the fragility of current defense systems and the urgent need for automation, scalability, and cross-platform integration.<\/p>\n<h3>What Autonomous Cybersecurity Really Means<\/h3>\n<p>Autonomous cybersecurity, as envisioned by CrowdStrike, moves beyond traditional reactive models. It empowers systems with:<\/p>\n<ul>\n<li><b>Real-time decision-making:<\/b> AI-driven responses to threats before human intervention is needed.<\/li>\n<li><b>Proactive threat hunting:<\/b> Systems that seek out and neutralize vulnerabilities in real-time.<\/li>\n<li><b>Self-healing mechanisms:<\/b> Automatic mitigation and rollback of malicious changes or breaches.<\/li>\n<\/ul>\n<p>This paradigm shift aims to reduce reliance on human oversight and eliminate the window of opportunity for cybercriminals.<\/p>\n<h2>Falcon Platform: The Backbone of Autonomous Defense<\/h2>\n<p>CrowdStrike\u2019s Falcon platform lies at the center of this evolution. The enhancements introduced at Fal.Con 2025 show a commitment to delivering a holistic, API-driven cybersecurity ecosystem.<\/p>\n<h3>AI-Native Architecture<\/h3>\n<p>CrowdStrike pushed forward with its \u201cAI-native\u201d architecture, which integrates large language models (LLMs) with real-time security data to enable:<\/p>\n<ul>\n<li><b>Predictive analytics<\/b> that anticipate threats based on historical and contextual data.<\/li>\n<li><b>Natural language-driven incident response,<\/b> allowing analysts to query environments in real time with conversational queries.<\/li>\n<li><b>Faster incident triage<\/b> through automation of repetitive investigation steps.<\/li>\n<\/ul>\n<p>By leveraging Falcon\u2019s lightweight architecture and cloud-native design, enterprises can deploy across endpoints, cloud workloads, mobile, and identity systems with unmatched performance and minimal overhead.<\/p>\n<h3>Unified Platform Model<\/h3>\n<p>Falcon\u2019s unified model also addresses a major challenge in cybersecurity\u2014<b>too many disconnected tools<\/b>. The platform brings everything together with centralized visibility and orchestration:<\/p>\n<ul>\n<li><b>Single-agent deployment<\/b> eliminates fragmentation and simplifies endpoint management.<\/li>\n<li><b>Cross-domain correlation<\/b> improves threat detection across cloud, identity, and network.<\/li>\n<li><b>Scalability<\/b> supports growing digital environments without compromising speed or accuracy.<\/li>\n<\/ul>\n<h2>Responding to the Global Outage: Hard Lessons and Lasting Change<\/h2>\n<p>Fal.Con 2025 served not only as a product launchpad but also as a moment of reflection on the 2024 global outage that exposed limitations in many of today\u2019s cybersecurity strategies. CrowdStrike\u2019s response has centered on a deeper integration of redundancy, AI-enabled threat containment, and predictive disruption detection.<\/p>\n<p><a href=\"https:\/\/siliconangle.com\/2025\/10\/03\/crowdstrike-bets-autonomous-cybersecurity-fal-con-crowdstrikefalcon\/\" target=\"_blank\"><b>Learn more from the original article on SiliconANGLE<\/b><\/a><\/p>\n<h3>Emphasis on Resiliency<\/h3>\n<p>Through innovations like <b>Falcon Complete<\/b> and AI-powered detection and response tools, CrowdStrike aims to ensure that future incidents are mitigated instantaneously, often before customers notice a disruption.<\/p>\n<h3>Operationalizing Machine Learning at Scale<\/h3>\n<p>The company highlighted advances in scalability and deployment agility that allow Falcon to process petabytes of security telemetry in seconds, enabling real-time anomaly detection that would be impossible with legacy systems.<\/p>\n<h2>Future-Ready Cyber Defense: What\u2019s Ahead?<\/h2>\n<p>CrowdStrike\u2019s bet on autonomous cybersecurity doesn\u2019t just address current threats\u2014it fundamentally reimagines the future of digital defense. With cyberattacks becoming more complex and state-sponsored operations more frequent, the ability to outpace adversaries with machine-driven intelligence could become the defining advantage.<\/p>\n<h4>Continual Platform Evolution<\/h4>\n<p>The ongoing updates to Falcon\u2014based on global threat intelligence and customer feedback\u2014demonstrate a commitment to dynamic evolution. From zero-trust capabilities to cloud-native application protection, Falcon is building a resilient digital perimeter from the inside out.<\/p>\n<h4>Embracing AI as a Force Multiplier<\/h4>\n<p>Instead of replacing humans, CrowdStrike\u2019s AI strategy aims to <b>augment analysts\u2019 effectiveness<\/b> and turn raw data into actionable insights. This human-machine collaboration is at the core of CrowdStrike\u2019s vision.<\/p>\n<h2>Conclusion: A New Era of Cybersecurity Leadership<\/h2>\n<p>CrowdStrike\u2019s announcements at Fal.Con 2025 weren\u2019t just incremental updates\u2014they marked a decisive shift towards a future where autonomous security platforms drive cyber resilience and strategic advantage. As enterprises prepare for increasingly sophisticated threats, CrowdStrike is doubling down on innovation, automation, and AI to lead the charge.<\/p>\n<p>With its deepened commitment to scale, intelligence, and reliability, CrowdStrike is charting a course where organizations aren\u2019t just protected\u2014they\u2019re empowered to operate fearlessly in the digital era.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: A Bold Leap Toward Autonomous Cybersecurity CrowdStrike made waves at Fal.Con 2025 with its intensified focus on autonomous cybersecurity, fortified by the strength of its Falcon platform and cutting-edge AI capabilities. Taking the lessons learned from the global outage that rocked enterprises the previous year, CrowdStrike is accelerating its mission to deliver resilient, scalable, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,12],"tags":[],"class_list":["post-2845","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligent","category-all-posts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference - Yeap Technology News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference - Yeap Technology News\" \/>\n<meta property=\"og:description\" content=\"Introduction: A Bold Leap Toward Autonomous Cybersecurity CrowdStrike made waves at Fal.Con 2025 with its intensified focus on autonomous cybersecurity, fortified by the strength of its Falcon platform and cutting-edge AI capabilities. Taking the lessons learned from the global outage that rocked enterprises the previous year, CrowdStrike is accelerating its mission to deliver resilient, scalable, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/\" \/>\n<meta property=\"og:site_name\" content=\"Yeap Technology News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YeapTechnology\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-05T03:07:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png\" \/>\n<meta name=\"author\" content=\"dsonson23\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsonson23\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/\"},\"author\":{\"name\":\"dsonson23\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/#\/schema\/person\/c14af09cbb85300c66a5d51206c0d7f8\"},\"headline\":\"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference\",\"datePublished\":\"2025-10-05T03:07:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/\"},\"wordCount\":721,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png\",\"articleSection\":[\"AI - Artificial Intelligent\",\"All\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/\",\"url\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/\",\"name\":\"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference - Yeap Technology News\",\"isPartOf\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png\",\"datePublished\":\"2025-10-05T03:07:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage\",\"url\":\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png\",\"contentUrl\":\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/apps.yeap.technology\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/#website\",\"url\":\"https:\/\/apps.yeap.technology\/news\/\",\"name\":\"Yeap Technology News\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/apps.yeap.technology\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/#organization\",\"name\":\"Yeap Technology News\",\"url\":\"https:\/\/apps.yeap.technology\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/01\/yeap-logo-scaled.jpg\",\"contentUrl\":\"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/01\/yeap-logo-scaled.jpg\",\"width\":2560,\"height\":779,\"caption\":\"Yeap Technology News\"},\"image\":{\"@id\":\"https:\/\/apps.yeap.technology\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/YeapTechnology\",\"https:\/\/www.instagram.com\/yeap.technology\",\"https:\/\/www.tiktok.com\/@yeaptechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/#\/schema\/person\/c14af09cbb85300c66a5d51206c0d7f8\",\"name\":\"dsonson23\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/apps.yeap.technology\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e7a9bff5aa300d59e08bfe18bcd9311595fd84c1afa499150d4ce253149d314?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e7a9bff5aa300d59e08bfe18bcd9311595fd84c1afa499150d4ce253149d314?s=96&d=mm&r=g\",\"caption\":\"dsonson23\"},\"sameAs\":[\"https:\/\/apps.yeap.technology\/news\"],\"url\":\"https:\/\/apps.yeap.technology\/news\/author\/dsonson23\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference - Yeap Technology News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/","og_locale":"en_US","og_type":"article","og_title":"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference - Yeap Technology News","og_description":"Introduction: A Bold Leap Toward Autonomous Cybersecurity CrowdStrike made waves at Fal.Con 2025 with its intensified focus on autonomous cybersecurity, fortified by the strength of its Falcon platform and cutting-edge AI capabilities. Taking the lessons learned from the global outage that rocked enterprises the previous year, CrowdStrike is accelerating its mission to deliver resilient, scalable, [&hellip;]","og_url":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/","og_site_name":"Yeap Technology News","article_publisher":"https:\/\/www.facebook.com\/YeapTechnology","article_published_time":"2025-10-05T03:07:34+00:00","og_image":[{"url":"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png","type":"","width":"","height":""}],"author":"dsonson23","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsonson23","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#article","isPartOf":{"@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/"},"author":{"name":"dsonson23","@id":"https:\/\/apps.yeap.technology\/news\/#\/schema\/person\/c14af09cbb85300c66a5d51206c0d7f8"},"headline":"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference","datePublished":"2025-10-05T03:07:34+00:00","mainEntityOfPage":{"@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/"},"wordCount":721,"commentCount":0,"publisher":{"@id":"https:\/\/apps.yeap.technology\/news\/#organization"},"image":{"@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage"},"thumbnailUrl":"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png","articleSection":["AI - Artificial Intelligent","All"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/","url":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/","name":"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference - Yeap Technology News","isPartOf":{"@id":"https:\/\/apps.yeap.technology\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage"},"image":{"@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage"},"thumbnailUrl":"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png","datePublished":"2025-10-05T03:07:34+00:00","breadcrumb":{"@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#primaryimage","url":"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png","contentUrl":"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/10\/pngskoidb2c0e1c0-cf97-4e19-8986-8073905d5723sktida48cca56-e6da-484e-a814-9c849652bcb3skt2025-10-05T033A073A32Zske2025-10-06T033A073A32Zsksbskv2024-08-04sig3ZULk53vnNuVJXHkFyp2BBW1UK7N4TXPa9C99SQ23K6M3D-400x400.png"},{"@type":"BreadcrumbList","@id":"https:\/\/apps.yeap.technology\/news\/crowdstrike-embraces-autonomous-cybersecurity-at-fal-con-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/apps.yeap.technology\/news\/"},{"@type":"ListItem","position":2,"name":"CrowdStrike Embraces Autonomous Cybersecurity at Fal.Con Conference"}]},{"@type":"WebSite","@id":"https:\/\/apps.yeap.technology\/news\/#website","url":"https:\/\/apps.yeap.technology\/news\/","name":"Yeap Technology News","description":"","publisher":{"@id":"https:\/\/apps.yeap.technology\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/apps.yeap.technology\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/apps.yeap.technology\/news\/#organization","name":"Yeap Technology News","url":"https:\/\/apps.yeap.technology\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apps.yeap.technology\/news\/#\/schema\/logo\/image\/","url":"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/01\/yeap-logo-scaled.jpg","contentUrl":"https:\/\/apps.yeap.technology\/news\/wp-content\/uploads\/2025\/01\/yeap-logo-scaled.jpg","width":2560,"height":779,"caption":"Yeap Technology News"},"image":{"@id":"https:\/\/apps.yeap.technology\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YeapTechnology","https:\/\/www.instagram.com\/yeap.technology","https:\/\/www.tiktok.com\/@yeaptechnology"]},{"@type":"Person","@id":"https:\/\/apps.yeap.technology\/news\/#\/schema\/person\/c14af09cbb85300c66a5d51206c0d7f8","name":"dsonson23","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apps.yeap.technology\/news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e7a9bff5aa300d59e08bfe18bcd9311595fd84c1afa499150d4ce253149d314?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e7a9bff5aa300d59e08bfe18bcd9311595fd84c1afa499150d4ce253149d314?s=96&d=mm&r=g","caption":"dsonson23"},"sameAs":["https:\/\/apps.yeap.technology\/news"],"url":"https:\/\/apps.yeap.technology\/news\/author\/dsonson23\/"}]}},"_links":{"self":[{"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/posts\/2845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/comments?post=2845"}],"version-history":[{"count":0,"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/posts\/2845\/revisions"}],"wp:attachment":[{"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/media?parent=2845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/categories?post=2845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apps.yeap.technology\/news\/wp-json\/wp\/v2\/tags?post=2845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}