SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Trader J's Inner Circle
NVDA 188.23+0.1%Nov 7 9:30 AM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Zen Dollar Round who wrote (56300)7/26/2024 10:58:56 AM
From: Trader J   of 56532
 
CRWD: We'll never really know the numbers behind it all. This will go down as just another case of process not being followed or a benign issue that become anything other than benign once it caused an outage like this. As an ex-CIO I can already here the regulators/auditors working on plans to start 'forcing' redundancy in end-point security implementations and even within private networks inside the network border. Of course, their policy requirements will be largely impossible to implement without major IT spend, yet again, and won't be real-world applicable. Don't get me started on what I was being told during the year-2000 non-event.

This is going to create a wave of new regulation and policy creation across the globe, especially in the U.S. where policy creation and regulator voices are the loudest. CRWD is just the latest actor in this security play and it proves how our increasing security footprint becomes more tenuous as it becomes more complex. The greatest threats remain the people behind the policies and procedures there to ensure safety and compliance.

Companies, including those with friends still employed, were forced to go to each PC to fix the issue and that likely means that a large majority of those have been addressed. That will be a tough issue to address ... even if the regulators demand redundancy in key point security systems and implementations. If a PC blue screens, it likely doesn't matter if there's upstream redundancy in place. They would seemingly have to have upstream redundancy with a separate end-user implementation/redundancy footprint and I don't see most companies willing to swallow that spend.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext