CrowdStrike executive apologizes to Congress for July global tech outage
An executive at cybersecurity company CrowdStrike apologized in testimony to Congress for sparking a global technology outage over the summer
Your support helps us to tell the story
From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.
At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.
The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.
Your support makes all the difference.An executive at cybersecurity company CrowdStrike apologized in testimony to Congress for sparking a global technology outage over the summer.
“We let our customers down,” said Adam Meyers, who leads CrowdStrike's threat intelligence division, in a hearing before a U.S. House cybersecurity subcommittee Tuesday.
Austin, Texas-based CrowdStrike has blamed a bug in an update that allowed its cybersecurity systems to push bad data out to millions of customer computers, setting off a global tech outage in July that grounded flights, took TV broadcasts off air and disrupted banks, hospitals and retailers.
“We’re deeply sorry and we are determined to prevent this from ever happening again,” Meyers told lawmakers.
CrowdStrike's faulty software update crashed about 8.5 million computers running Microsoft's Windows operating system.
Meyers said he wanted to “underscore that this was not a cyberattack” but was, instead, caused by a faulty “rapid-response content update” focused on addressing new threats. The company has since bolstered its content update procedures, he said.