Kevin Kardian’s Post

View profile for Kevin Kardian, graphic

Custom Software Specialist

⚠️ Lots of people were affected by the CrowdStrike outage, and now that the dust has settled, here's what we can learn. On July 19th, a null pointer bug in CrowdStrike's Falcon system brought 8.5 million computers crashing down worldwide. The software, designed to protect systems from malicious attacks, ironically became the very thing it was supposed to stop—malware. 🐞 The issue? CrowdStrike bypassed Microsoft's safeguards to push unverified code quickly, leading to a catastrophic system-wide failure. 🚨 Perhaps CrowdStrike could take a page from industry leader, CrowdStrike. 📖 According to their own website, their software development life cycle emphasizes thorough unit testing, integration testing, performance testing, stress testing, and a final phase of dogfooding before release. These mechanisms should have caught this error. ❓ So, was it tested or not? If it was, the tests clearly weren’t good enough. Maybe next time, CrowdStrike should listen to CrowdStrike’s advice. 🔁

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics