• mosiacmango@lemm.ee
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    3 months ago

    The CTO of a competitor, Sentinel one, was just on the security podcast Risky buisness. He went deep into how his company does this.

    Apprently, their client touches the kernel much less, so it is less likely to cause issues. They also have a large internal test bed that updates have to pass to go out at all, and then if they have a 2% failure rate during the wide deployment, the update is automatically stopped.

    Crowdstrike does almost none of this. There core client is deep in the kernel, making it powerful and dangerous. They apprently do test on their local machines, but the company is an apple shop, so none of the windows updates was tested locally. The updates pushed out started crashing computers immediately, but weren’t stopped for 78 minutes by manual intervention. That was long enough to crash 8 million computers across the world.