<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Crowdstrike Archives - Joshua Bellendir</title>
	<atom:link href="https://www.joshuabellendir.com/tag/crowdstrike/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.joshuabellendir.com/tag/crowdstrike/</link>
	<description>Global CIO &#124; Transformation Leader &#124; Trusted Advisor</description>
	<lastBuildDate>Fri, 21 Nov 2025 21:34:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.joshuabellendir.com/wp-content/uploads/2017/10/cropped-cropped-JBlogo.png?fit=32%2C32&#038;ssl=1</url>
	<title>Crowdstrike Archives - Joshua Bellendir</title>
	<link>https://www.joshuabellendir.com/tag/crowdstrike/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">186330610</site>	<item>
		<title>The Growing Insider Threat: Why Trusted Access Is Now One of Cybersecurity’s Biggest Risks</title>
		<link>https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/</link>
					<comments>https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/#respond</comments>
		
		<dc:creator><![CDATA[Joshua]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 21:27:14 +0000</pubDate>
				<category><![CDATA[Tech & Business]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Crowdstrike]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insider Threats]]></category>
		<guid isPermaLink="false">https://www.joshuabellendir.com/?p=53955</guid>

					<description><![CDATA[<p>The rise in insider-driven breaches continues to be one of the most concerning trends in cybersecurity. This incident shared by Brian Krebs and reported by BleepingComputer is another reminder that even the strongest organizations (Crowdstrike) are vulnerable when trusted access is misused or compromised. These hacking groups are openly recruiting &#8230;</p>
<p>The post <a href="https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/">The Growing Insider Threat: Why Trusted Access Is Now One of Cybersecurity’s Biggest Risks</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The rise in insider-driven breaches continues to be one of the most concerning trends in cybersecurity. This incident shared by Brian Krebs and reported by <a href="https://www.linkedin.com/feed/?msgControlName=view_message_button&amp;msgConversationId=2-ZTZhYzI0ZTctYzFhNi00NmI2LWFjNjgtMjY3OWFiNjFmMjBkXzEwMA%3D%3D&amp;msgOverlay=true&amp;trk=false#">BleepingComputer</a> is another reminder that even the strongest organizations (Crowdstrike) are vulnerable when trusted access is misused or compromised.</p>



<p>These hacking groups are openly recruiting employees and paying for insider access. Their target list spans telecom, retail, tech, cloud, gaming, and BPO companies. The sophistication of their social engineering and the speed at which they exploit access continues to increase.</p>



<p>For many companies, the biggest risk is not just external attackers. It is the combination of human behavior, access sprawl, weak identity governance, and the absence of strong cultural reinforcement around security.</p>



<p>This raises an important question for all of us in the industry:</p>



<p>What steps are you taking inside your organization to reduce the risk of insider threats?</p>



<p>Are you doubling down on identity governance, monitoring privileged access, improving off-boarding processes, building stronger security awareness programs, or investing in tools that help detect unusual behavior across your environment?</p>



<p>Curious to hear how others are approaching this challenge and what is working well in your companies.</p>



<p>You can read the full article here: https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/</p>



<iframe src="https://www.linkedin.com/embed/feed/update/urn:li:share:7397702856666931200" height="1412" width="504" frameborder="0" allowfullscreen="" title="Embedded post"></iframe>
<p>The post <a href="https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/">The Growing Insider Threat: Why Trusted Access Is Now One of Cybersecurity’s Biggest Risks</a> appeared first on <a href="https://www.joshuabellendir.com">Joshua Bellendir</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.joshuabellendir.com/the-growing-insider-threat-why-trusted-access-is-now-one-of-cybersecuritys-biggest-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">53955</post-id>	</item>
	</channel>
</rss>
