CrowdStrike will be just fine, thank you.
Because there’s no contradiction in having a massive security failure and future success
Today’s security breach is tomorrow’s Wall Street Darling
If there was ever a security company that should have gone out of business, that would be SolarWinds. In December 2020, numerous companies and US government agencies were breached through SolarWinds’s Orion software. Over half of the private-sector SolarWinds clients were affected.
On December 13, 2020, the Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 21–01 in response to the incident. CISA advised federal agencies to disconnect or power down affected SolarWinds Orion products from their networks immediately.
The attack was attributed to APT29 (Cozy Bear), part of the Russian Foreign Intelligence Service (SVR).
It’s not just the initial attack that gave SolarWinds a black eye; it was their post-incident response. A few of their failures included not immediately revoking the compromised digital signing certificate and suggesting that customers disable anti-malware tools before installing SolarWinds products. Only on December 21, 2020, they finally revoked the compromised certificates.