Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Technology

CrowdStrike Unhappy With 'Shady Commentary' From Competitors After Outage (arstechnica.com) 107

CrowdStrike's president hit out at "shady" efforts by its cyber security rivals to scare its customers and steal market share in the month since its botched software update sparked a global IT outage. From a report: Michael Sentonas told the Financial Times that attempts by competitors to use the July 19 disruption to promote their own products were "misguided." After criticism from rivals including SentinelOne and Trellix, the CrowdStrike executive said no vendor could "technically" guarantee that their own software would never cause a similar incident.

"Our industry is built on trust," Sentonas said. For rivals to take advantage of the meltdown to push their own products "lets themselves down because, ultimately, people know really quickly fact from, possibly, some shady commentary." Texas-based CrowdStrike had a reputation as many major companies' first line of defense against cyber attacks, but the high-profile nature of its clients exacerbated the impact of July's global disruption that shut down 8.5 million Windows devices. Insurers have estimated that losses from the disruption, which grounded flights and shut down hospital systems, could run into billions of dollars. Delta Air Lines, which canceled more than 6,000 flights, has estimated that the outages will cost it $500 million and has threatened litigation.

This discussion has been archived. No new comments can be posted.

CrowdStrike Unhappy With 'Shady Commentary' From Competitors After Outage

Comments Filter:
  • by VeryFluffyBunny ( 5037285 ) on Wednesday August 21, 2024 @12:14PM (#64724068)
    If you test then do a partial roll-out of updates, you tend to catch the problems before they affect ALL YOUR FUCKING USERS!
    • by Joe_Dragon ( 2206452 ) on Wednesday August 21, 2024 @12:30PM (#64724134)

      end users need update control (crowd strike had no control over role outs)

      • by lsllll ( 830002 ) on Wednesday August 21, 2024 @01:27PM (#64724380)

        crowd strike had no control over role outs

        What does this mean? Did their developers not write the code that rolls out updates to customers? Do their administrators not have any control over whether an update is released for production and, if so, to whom? If what you say is true, then they deserve to be obliterated from orbit.

        • You're both right but you're each talking about a different phase of the roll-out process.

          CrowdStrike rolls out updates to its customers.
          Customers roll out those updates to their systems.

          In a consumer / "non-enterprise" context those tend to be one step. Microsoft, for example, makes a patch available and Windows Update automatically installs it.

          But in mission critical systems it is common to treat any system changes as inherently risky. It's not at all uncommon to see air-gapped legacy systems that are run

          • crowd strike had no way to manage updates on the end user side other then blocking it at the firewall level.
            No way to have test groups, or set update windows.

          • by Vancorps ( 746090 ) on Wednesday August 21, 2024 @07:36PM (#64725486)

            It's worse than that. Most Crowdstrike environments actually do have ways to test roll-outs. You can have one group that gets the updates as soon as they are available, then you have the majority of your install base on N-1 meaning they are always one version behind.

            This however doesn't apply to definition updates and that's the rub as I believe it was the definition update that borked the whole process just like the Linux version did a few months prior.

            That is the reason a lot of customers are looking to jump ship, they clearly had a problem, knew about it in April, and fell into the same trap in July. For a security company who's main currency is trust, that's simply not acceptable.

      • by AmiMoJo ( 196126 )

        But then the user will keep hitting "postpone" until they get infected with a zero-day, and the CTO will cover their arse by blaming Crowdstrike.

        They can't win. Timely updates occasionally brick your computer, delayed updates leave you vulnerable to malware (and their corporate customers are juicy targets for phishing and ransomware).

        • having end users hit postpone is not the same as domain level WSUS role outs or even an away to set only update at X time.

    • by GoTeam ( 5042081 ) on Wednesday August 21, 2024 @12:53PM (#64724238)
      When you fuck up that big, expect your competitors to point it out to potential customers. Complaining about it won't fix anything.
      • by HBI ( 10338492 )

        This narcissist salesperson is creating doubt in minds. It'll be marginally efffective, and repeated over time Crowdstrike will be able to overcome what should have been a business-ending incident.

        • by TWX ( 665546 ) on Wednesday August 21, 2024 @01:45PM (#64724454)

          The narcissist salesperson isn't doing shiat compared to what Crowdstrike did to their customers.

          I had to help with my org's response. Thankfully we're small enough that the site visits for those few devices that required site visits were regional, not national in scope, and we were able to deal with most non-end-PC endpoints without having to physically touch hardware, but it was still a PITA and affected mobile end-user-endpoints in addition to servers and normal on-prem enterprise PCs. Real egg-on-face even with getting priority backend systems working quickly.

          If Crowdstrike wants to avoid competitor's sales staff belittling them then they need to stop giving legitimate reasons to be belittled.

          • by HBI ( 10338492 )

            I don't disagree but these kind of leeches in sales are able to keep even the worst products in circulation for far longer than seems appropriate based on their efficacy.

            This is just how the game is played.

            • by TWX ( 665546 )

              I am well aware of that, I've been to Cisco Executive Briefings at their Tasman Way "Customer Experience Center" twice before they sold off that property when they moved their headquarters.

              Plying the executives that went along with drink, food, and swag is stupidly effective.

    • They're not wrong. But they're also guilty of it. As a security practitioner myself, I well know just how much the sales side of the industry loves to use FUD to peddle their crap. And most of what they sell is exactly that. Even worse, they resort to spamming, something the industry itself is supposed to be preventing, not participating in. I'd put security salesmen right below dog shit, and right below security salesmen are car dealerships.

      • by taustin ( 171655 )

        There have been multiple surveys in which people have said they're prefer living next door to a child molester over living next door to a spammer.

      • All these "security" products are just malware in and of themselves. It's amazing how fast a PC runs when you're running it bareback then install one of these "security" products on it and watch your performance get cut in half.
    • by nyet ( 19118 )

      No mention of why you shouldn't do file parsing in ring 0?

    • by gweihir ( 88907 ) on Wednesday August 21, 2024 @01:35PM (#64724416)

      And if you do proper input validation, like _all_ competently written code should do and even more so anything security critical, then that partial rollout has a pretty good chance of not failing either. These people messed up on an unbelievable level. Gross incompetence is to weak a term for it.

      • by nyet ( 19118 )

        This message keeps getting lost. Too many complete idiots out there.

        Not just input validation.... but WHERE you do the validation, let alone the loading/parsing itself. Certainly not in ring0, and also a file that is remotely installed.

        Beyond stupid.

        • by gweihir ( 88907 )

          Indeed. Of course, you need to validate all input in ring0 as well, if you have input. But that should always be an additional barrier, not the first one.

          These people do not even know the very basics of writing secure and dependable coding.

  • by backslashdot ( 95548 ) on Wednesday August 21, 2024 @12:14PM (#64724070)

    That's what they get for firing me from my internship last month just cause I made one lousy mistake.

    • by GoTeam ( 5042081 )
      Just out of curiosity, did HR (or an HR subgroup) have lots of pointless meetings or celebrations?
    • by lsllll ( 830002 )
      How can you be an intern with a low UID?
      • by TWX ( 665546 )

        mid-life career change?

      • by sconeu ( 64226 )

        This lower UID was able to recognize the joke [youtube.com]

      • He's a *career* intern. :-)

      • I never thought I'd face age discrimination on slashdot of all places -- the safe space for nerds. After decades on slashdot, I finally climb out of my bed (or is it a sofa?) of Cheetos wrappers and Red Bull cans, get a hair cut and shave my neck beard, to get myself a job but I still can't get no respect.

        • by lsllll ( 830002 )

          but I still can't get no respect.

          You have all my respect for being able to dwell in your parents' basement for this long!

          All joking aside, I get the joke now :-)

    • I don't think it's funny to claim that they might have been half-competent, when reality is they didn't need an intern, didn't have phased rollouts and didn't even have an automated detection and response in place that detected that the endpoint with their agents went offline immediately after an update of the agent payload. Took them an hour and eighteen minutes to notice and stop the rollout. They don't deserve intern jokes, they deserve tar and feathers.
      • by nyet ( 19118 )

        Hot take that everyone is going to hate: Phased rollouts excuse poor design decisions. It's a crutch. It allows devs to do stupid things with the excuse "oh, any problems will get caught in staging".

        Please, stop with this idiocy as a "solution". It's a shit mitigation. Necessary, yes. The actual solution? Fuck no.

        • The old adage says "To err is human..." But the blast radius of most bad decisions historically was limited. It is right and good to mitigate with things like phased rollouts. For the rest of the adage says, "to really screw things up, you need a computer."
        • by Bongo ( 13261 )

          Hot take that everyone is going to hate: Phased rollouts excuse poor design decisions. It's a crutch. It allows devs to do stupid things with the excuse "oh, any problems will get caught in staging".

          Please, stop with this idiocy as a "solution". It's a shit mitigation. Necessary, yes. The actual solution? Fuck no.

          And besides, if the point of the service is to be able to block malicious activity that's happening live in the field, then you really don't want to be waiting to implement those responses. A firewall has to be reliable enough to block live packets, without being crashed by "surprises".

          • ahh the very thoughtful argument that MS should abolish staged rollouts for patch Tuesday, doubly so when issues are actively being exploited. Definitely will fix more issues than it will cause. NOT
  • by BigFire ( 13822 ) on Wednesday August 21, 2024 @12:16PM (#64724078)

    Shady? Really? Don't make my life hell and you can start talk.

  • by Fly Swatter ( 30498 ) on Wednesday August 21, 2024 @12:16PM (#64724084) Homepage
    A bad product has people checking their shoes for poop.
  • Zero sympathy. (Score:5, Insightful)

    by PsychoSlashDot ( 207849 ) on Wednesday August 21, 2024 @12:17PM (#64724088)
    If a restaurant gets caught with their chefs defecating in the food they cook, it's only natural for all the other restaurants in town to say "our chefs don't crap on your plate... maybe try eating here."

    A (horrible) mistake was made. Own it. Don't complain that your competitors are pointing out how they're different. Complaining just makes you look shady, and like you don't really understand your mistake so... why would we trust you really understand the scale of change you need to make?
    • by GoTeam ( 5042081 )
      Exactly right! I was just starting to evaluate new security vendors and they were one I was looking at. Two days into my assessment this hell happened. Now, even if I found that they were the best product for our environment, their fuck-up was so big that the non-technical group of directors would freak out if I tried to make a case for CrowdStrike.
      • by CAIMLAS ( 41445 )

        The fact that they aren't owning the fuck up only makes the matters worse.

        What they should be doing is having a "good will" campaign, and being very public about the changes they're making to make sure this doesn't happen again. They're not doing that - they're doubling down.

    • I think their point is that the competition is talking out of it's ass. As if a botched updated from any of the other vendors or a false positive on a critical system process or file couldn't happen... None of them should be talking right now, and instead looking at how to strengthen their internal processes.

      Anyone that has worked with any of these vendors knows that it's a razor edge we play on and any small f'up can blow up in your face. And sometimes, the f'up isn't even their own fault (the security

      • I think their point is that the competition is talking out of it's ass. As if a botched updated from any of the other vendors or a false positive on a critical system process or file couldn't happen... None of them should be talking right now, and instead looking at how to strengthen their internal processes.

        Granted, partially. But I can offer that the EDR/MDR vendor my company recommends absolutely does staged rollouts of updates, starting with their own systems. Anyone can screw up, yes. But the magnitude of screwup was much, much larger than it should have been.

        Their PR rep should have told them to just shut up and take the hits, focus on pushing the message that they are putting in processes and systems to ensure this won't happen again, are working closely with OS vendors on how to limit impacts in the future, etc... not going to rebuild the reputation any other way.

        Wholeheartedly agreed here. This is Crowdstrike being tone-deaf.

    • by CAIMLAS ( 41445 )

      Exactly.

      Nevermind the fact that they're gaslighting about "trust". Really, bro? You just crippled the global economy for a week. All travel was down for days, and a great deal of finance, was down for the better part of a day. It was a full week before things were 'back to normal'.

      Definitely a company to avoid. I'd short the shit out of their stock if I wasn't so poor.

    • Of course they'll say that. But the other restaurants probably didn't check up on their own chefs before saying that.

      Meanwhile, the poop restaurant is checking constantly now.

      Which one is less likely to become the next fecal point?

      • Of course they'll say that. But the other restaurants probably didn't check up on their own chefs before saying that.

        Meanwhile, the poop restaurant is checking constantly now.

        Which one is less likely to become the next fecal point?

        Probably. The other restaurants probably put twice as much poop on their food. And probably send teams to rob their customers' houses while they dine. And probably the profits all go to fund research to create new diseases that only impact children.

        Which one is less likely to become the next fecal point? The restaurant that has demonstrated they don't have an anti-fecal-fetishist-cook policy. Meanwhile, (at least some of) the other restaurants have very carefully explained that they DO have such poli

  • by bobthesungeek76036 ( 2697689 ) on Wednesday August 21, 2024 @12:19PM (#64724094)
    But did they cause a major frickin' outage? You f---ed up and now you pay the price. Shut the f--- up.
    • by HiThere ( 15173 )

      Yeah, his major point is correct, that nobody can guarantee they won't have a problem just as bad, but to expect that the competition won't point out that they not only *could* have a problem that bad, but the actually *did* is unreasonable, and just reminds me that they did.

      • by sjames ( 1099 )

        They can't GUARANTEE it but than can take a lot more precautions to reduce the probability than CrowdStrike did.

        • by dgatwood ( 11270 ) on Wednesday August 21, 2024 @02:14PM (#64724570) Homepage Journal

          They can't GUARANTEE it but than can take a lot more precautions to reduce the probability than CrowdStrike did.

          Gross incompetence is probably being too kind. Let's see:

          • Major rollouts happen without intervention. Check.
          • Major rollouts happen to everyone all at once without a 1% canary. Check.
          • Parsing configuration at ring 0. Check.
          • Not writing tests that cover error cases. Check.
          • Not properly validating data before you push it out. Check.

          About the only critical mistakes that they missed were "rollout on Friday at 5 P.M. before a holiday weekend" and "allow a single approver to commit to production", and I can't be certain that they didn't do the latter of those, because I don't work there.

          This is a screw up on the level that in a just world should pretty much bury a company. If they still have customers, they should be figuring out how to appease them and talking very publicly as quickly as possible about the fundamental architectural and procedural changes they are making to ensure that similar things never happen again to stem the bleeding.

          Whining that their competitors are saying mean things about them leads me to instead assume that they still don't fully comprehend how badly they screwed up and aren't making any fundamental architectural and procedural changes to prevent similar mistakes in the future, which gives me very little faith that this won't happen again. And in any world — even a relatively unjust one — a repeat of this disaster absolutely will be enough to bury the company.

          Glad I don't own any of their stock.

          • Not writing tests that cover error cases. Check.

            Back in the mid 80s, I was working at JPL as a "seeing eye person" for a senior programmer who'd lost his vision to diabetic retinopathy. Mostly, we were working in FORTRAN, because that's what was required. Much of the time, we were working with nested IF statements, and I saw that every time he came to the last possible case, he still tested for it. In the unlikely event that the test failed, he saved the data, printed a distinctive error message -- 1
          • by nyet ( 19118 )

            > Parsing configuration at ring 0. Check.

            Thank you for pointing this out. It constantly gets overlooked.

            • This a 1000 times. Microsoft called that out as well in their analysis of the issue. And they also effectively did roll out on a Friday. Alot of people spent their weekends cleaning up their mess.
          • A question I posed a couple times but got differing response. I never supported CrowdStrike so not knowledgable about the product. Does CrowdStrike offer "rings" for deployments? If they do and the customers decided to just go with the defaults and let updates happen as CS sees fit some of the onus is on the customer. When the option is available I never let updates happen at speed. 2% gets them when available and others x amount of time later. If there is no mechanism then eff CS.
    • by sjames ( 1099 )

      Perhaps, by not ignoring decades of best practices, the competition has made themselves much less likely to cause a major outage. It's fair enough for the competition to point that out and they have some (albeit very limited) evidence behind the claim.

      Meanwhile, CrowdStrike's president seems happy enough FUDding the competition by claiming, with no evidence whatsoever, that they are just as likely to have this problem.

    • As if SentinelOne has never caused an outage? They simply haven't done it YET on as a massive scale as CS because they don't have the market penetration.

      None of these vendors are perfect with a 100% track record. They should all shut the f--- up.

  • by King_TJ ( 85913 ) on Wednesday August 21, 2024 @12:22PM (#64724106) Journal

    It's not "shady" to attack a competitor when its product utterly and completely failed, causing the same type of downtime and disruption they bought it to try to prevent!

    Obviously, yes - software errors can happen to any vendor. That's not the point. It's about how a company handles this eventuality. Testing before a mass push to production is one way, and rolling out in stages is another. You can even do what Microsoft often does where they let people opt in to receiving "early updates". If they really want to get every cutting edge patch and update ASAP, great. They're electing to be part of your test group....

    • Re: (Score:3, Interesting)

      by Ed Tice ( 3732157 )
      CrowdStrike is not a downtime avoidance solution. It's an intrusion prevention and detection system. And it does that job fairly well. In order to detect intrusion, the software needs to run with very high privileges and due to the ever-changing nature of adversaries needs constant updates. That's a pretty difficult thing to do. Yes, they had a defect and yes it caused downtime. But the total cost/downtime even to the worst affected customers is still probably less than a single ransomware attack.

      Gi

      • by lsllll ( 830002 )
        Is that you, Michael Sentonas?
      • by CapS ( 83352 ) on Wednesday August 21, 2024 @04:42PM (#64725090)

        Crowdstrike is absolutely a downtime avoidance solution -- that comes by default with being an antivirus/intrusion detection system. If Crowdstrike detected an virus and solved it by shutting down the entire company's computers, that would be effective, but obviously would cause a major problem.

        It's actually easy to say what Crowdstrike could have done better -- they reported the details themselves:
        https://www.crowdstrike.com/wp... [crowdstrike.com]

        This includes array checks, content validation, and staged deployment.

        I think a lot of criticism is deserved in this case due to the severity of the mess-up. The company brought down a decent percentage of the world's business computers and caused billions (perhaps trillions) of dollars in lost revenue, productivity, lost data, etc. It deserves (I'd even say *requires*) a lot of scrutiny, openness (on behalf of Crowdstrike) and some consternation from everyone.

      • by organgtool ( 966989 ) on Wednesday August 21, 2024 @05:49PM (#64725292)

        CrowdStrike is not a downtime avoidance solution. It's an intrusion prevention and detection system

        These two things are not mutually exclusive. Most IDS solutions are capable of performing just fine without making their host systems unbootable.

        And it does that job fairly well

        You must be an executive or work in PR.

        But the total cost/downtime even to the worst affected customers is still probably less than a single ransomware attack.

        So as long as their user experience is just slightly better than that of a ransomware attack, then everything is alright. That might even be true - if it was the only product on the market.

        Given how little is publicly known, it's hard to say what else CrowdStrike could have done better

        It seems to have affected almost every system it touched. I guess they could have tried it on actual hardware before rolling it out. They also could have rolled it out in waves so that it wouldn't have affected almost all of their customers at once.

        There are many idea that will come out with the benefit of hindsight all of which will suddenly be "obvious."

        Basic testing and upgrade waves are not hindsight - they've been considered best practices for many years.

        It seems that there is a lot of criticism being directed at CrowdStrike's implementation that is really nothing more than poorly disguised anti-IDPS rhetoric.

        I think the poor bastards that had to fix hundreds, or even thousands, of unbootable computers due to CrowdStrike's avoidable mistake would say that the criticism is more than "rhetoric".

      • How do you know that Crowdstrike does a good job at intrusion prevention? There's a big [citation needed] there.
      • Their software is supposed to prevent rootkits. If a rootkit is already loaded there's no guarantee, it will be safer to parse in kernel mode. It's a risk that is simply not worth it.
  • Imagine a crowd striking a company called "CrowdStrike" and said company getting upset.

    • by TWX ( 665546 )

      Every time I read Crowdstrike I'm reminded of this movie quote, "I said the crowd is unarmed! There are a lot of women and children down there, all they want is food, for god's sake!"

  • We f*cked up and are now losing customers left and right and are not being forgiven for the massive financial damage we did, this just isn't fair.

    Come back, everyone, come back, otherwise my normally huge CEO bonus is going to suck this year!

    • > this just isn't fair

      Well ... that might be true.

      There's a proffered theory that somebody had to delete data in a way to avoid auditing (winpe or whatever it's called now) .

      Crowdstrike is the company that was just somehow allowed to tell FBI to pound sand when they subpoenaed the DNC servers.

      That only means one thing and imagine if the CEO does care but knew his company was being sacrificed.

      What a terrible situation to be in.

      (y'all can line up dates on the calendar to see the theory that fits the data -

  • They can't technically guarantee it, but any security company that raises this big of a red flag about their testing processes deserves to be laughed out of the industry.

    • by gweihir ( 88907 )

      Any software security enterprise that cannot do proper input validation in their code is a joke, nothing else. That Crowdstrike cannot do proper testing either is just the icing on the cake.

  • by bill_mcgonigle ( 4333 ) * on Wednesday August 21, 2024 @12:43PM (#64724180) Homepage Journal

    Do SentinelOne and Trellix do CI and QA?

    That might be a competitive market advantage.

    • The problem is that CrowdStrike also claimed to do those things. They claimed to be using industry standards and quality control and to an extent that was true, the problem is that you can do the wrong type of quality control and CI/CD. Part of this problem was that shoddy QA was part of their CI/CD so they continuously integrated and deployed shoddy updates. The crux of the problem was a dev pushed a code update after the tests completed and because the code was already considered tested it thus went throu

  • I guess we're all going to go on ignoring the fact that the only reason this was even possible in the first place is the EU's enforcement of Microsoft's Swiss-cheese security by the former forcing the latter to give random dirtbag companies like CrowdStrike unrestricted ring-0 access to the kernel, eh? I guess not, though, the current /. groupthink being that the EU is a saint and every US tech company is the devil*.

    > no vendor could "technically" guarantee that their
    > own software would never cause

    • by gweihir ( 88907 )

      Stop pushing that bullshit lie. The EU mandated a level playing field as anti-trust law requires. MS made a disingenuous offer. The competitors complained. Hence MS (!) decided to open up kernel access.

    • by Morty ( 32057 )

      The EU mandated that Microsoft provide competitors with the same level of access that their own (competing) products enjoyed. Microsoft had at least three options on how to respond and stay in compliance:

      1. eat their own dogfood -- make their own products use the same APIs that they were trying to get other companies to use

      2. get out of the business of making these security products and let the ISVs figure it out

      3. let the ISVs into ring 0

      Microsoft could have gone with options 1 or 2, and then Crowdstrike

    • by nyet ( 19118 )

      No. It's my machine. I should be able to put whatever I want in ring 0.

      But if I do, that's MY responsibility.

  • but I resent everybody in the dorm room whispering that I can't clench my anus.

  • CrowdStrike's competitors better stop it, or they'll tell Mom. And then Mom will tell them to stop being mean. And if they don't stop being mean, then she's gonna wake up Dad. And Dad works nights at the steel plant. So they better stop it!
  • by wakeboarder ( 2695839 ) on Wednesday August 21, 2024 @01:28PM (#64724390)
    deserves any criticism they get. They caused billions of dollars worth of economic damage because they didn't follow best practices. You follow best practices so stuff like this doesn't happen. I hope other companies learn from this.
  • To be more exact, they messed up massively because they cannot even get simple software engineering and testing right. Anybody sane of their customers will go to a competitor, because they cannot really be worse, but will likely be better.

  • What I want is instructions on how to remove their crapware.

  • When it's (a) indisputably your fault, and (b) everyone is fully incentivized to say so, the play is to (c) find a more attractive scapegoat. Never just whine that people are being unfair.
  • by nightflameauto ( 6607976 ) on Wednesday August 21, 2024 @02:33PM (#64724646)

    Someone's updated their glossary!

    I'm sorry, at some point you "in charge" types need to accept that when someone points at a real thing that actually happened, that anybody with a moment of time and an internet connection can check for themselves, it's not "fake" it's not "shady" it's just reality smacking you in the face, just like it does everybody else that sometimes makes mistakes. Most of us normal, non-in-charge folks have to own it when we make a mistake, because there's no one else to point the finger at. When you, or your company, make a mistake, you are *NOT* absolved of it just because it's a corporation. You are *NOT* entitled to tell others they aren't allowed to comment on your mistakes. You may try to pretend that the issue isn't yours to own, but others are perfectly within their rights to point out that you're only pretending. And frankly, your fantasy doesn't mesh with reality.

    Crowdstrike fucked up bad. Competitors rightly said, "Try our shit instead. We haven't caused a global issue." Crowdstrike's president is coming off like a toddler that's angry they had to take their timeout. "But, Billy doesn't have to sit in the corner!"

    "Billy didn't shit his pants then take them off and toss them on the picnic table."

    "That's some really shady commentary!"

    What is it about today's C-suite that makes them think they are just *ENTITLED* to whatever they want, whenever they want, and then they feel about whining publicly like a bunch of children when the rest of the world doesn't bow down to kiss their ass when they drop the ball completely? We already don't like you folks. How about you pretend to join the rest of humanity and act a bit humble when you drop the ball so thoroughly? This comes off as the corporate equivalent of throwing yourself on the ground and screaming, "I WON'T ADMIT IT! I WON'T I WON'T I WON'T!" Take responsibility. Take a moment to reflect on your failure and the failure of your company. Assess. Maybe reassess several times. Tell the public what you'll do to mitigate the potential in the future. Then maybe we can move on.

    This public denial just reminds everybody that you're awful. And it makes all of us want you to fail again just so we can laugh at you and anybody that accepts your half-assed processed going forward.

    • What is it about today's C-suite that makes them think they are just *ENTITLED* to whatever they want

      Aristocrats will be aristocrats. I am uncertain how that developed in the USA, but it is here and it is very bad.

      • What is it about today's C-suite that makes them think they are just *ENTITLED* to whatever they want

        Aristocrats will be aristocrats. I am uncertain how that developed in the USA, but it is here and it is very bad.

        They were always here. But the original aristocracy in America were very good about putting on a false front and being "men of the people." Or at least it appears that way looking back at the founding of our country, or even before. I just think our current crop are too stupid, or too arrogant, to bother keeping up the facade. They want people to *KNOW* they see themselves as better people, and everyone else as lesser.

  • Pretty much everyone I know was effected, even my mom and uncle were complaining about it. If I were a CIO I would be evaluating replacement options. This won't kill Crowdstrike, but adopting them as a vendor in the future will be extremely questionable going forward.

    • by Z00L00K ( 682162 )

      As it looks like right now I have realized that it doesn't matter if you have a security add-on like Crowdstrike or any other third party supplier because when there's a strike it goes faster than anyone can handle - and it circumvents most security solutions.

      I have realized that the only way is to compartmentalize the network as much as it's feasible to do. Keep your printers on a separate subnet for example. Modern multifunction printers are smart enough to allow installation of programs. So are TV:s.

      In a

      • Simply it is not considered safe to have the TVs and video billboards on the Business LAN. At my last enterprise, an entire 30 story tower full of TVs and Videoconf get their own wireless networks on the guest wireless APs, and there was a passive optical taps going to deep packet to see what they are doing outside of the TLS envelope with the same toolsets we monitor everything else with. There was always some TV store app phoning home to a russia or china IP. They also each got a actual TV antenna t
  • ...but I refuse to acknowledge it and am angry people are indirectly saying I'm shit. Also, CrowdStruck sucks.
  • Wer den Schaden hat, braucht für den Spott nicht zu sorgen.

  • Unintended consequences for everyone!
  • If you do dumb shit and knock half of corporate america into the jackpot, you deserve what you get.

    Don't want to get dragged for your colossal fuckups? Don't colossally fuck up.

  • Every CTO that was impacted by Crowdstrike problem should be fired... Crowdstrike rolled out an untested update, Had poor developer review, no QA, and had a coding error that even a 1st year Dev should not make. But companies using Crowdstrike accepted updates directly to Prod without testing, fencing, scaled deployment. They had no rollback plan, and no contingency plan. They are incompetent.
  • That's OK, we too have been unhappy with Crowdstrike.

A bug in the code is worth two in the documentation.

Working...