A (5:48)
If you're anything like me, flying can be a somewhat stressful experience. It's a lot to think about. Will I get to the airport on time? Do I have my passport? Do all my liquids meet TSA's requirements? But you know, here's something you probably never worried about. A routine software update grounding your flight and stranding you in an airport for days. Well, add that to the list, because in 2024, that's exactly what happened to more than a million passengers around the world. The company behind that disaster was CrowdStrike they launched in 2011 with a bold idea. Instead of using traditional antivirus software, they would build a cybersecurity company entirely around the cloud. This would give them real time control over their client systems without forcing companies to constantly install and update software themselves. And instead of just blocking known viruses, CrowdStrike would take a more proactive approach. They would closely track how elite hackers operate and push frequent updates to their customers, staying one step ahead of potential attackers. Within just a few years of their founding, CrowdStrike's groundbreaking approach paid off. The company attracted big name investors and clients. But eventually, the very approach that made CrowdStrike so powerful exposed a dangerous flaw. And when that weakness finally surfaced, the consequences were catastrophic. Not just for airports, but for countless critical systems around the world. This is episode one guarding the cloud foreign it's 1999, and George Kurtz is sitting at his desk at the accounting firm Ernst and young. He's 29 years old and one of the youngest senior managers of the company, but he's ambitious and ready for more. On paper, Kurtz has done everything right. He earned an accounting degree from Seton hall and taught himself computer programming. After College, he joined PricewaterhouseCoopers, where he gravitated toward a new discipline most people barely CyberSecurity. And in 1993, he became the fifth person to join PwC's security team. He worked hard and learned fast, spending much of his time creating innovative security solutions for Internet connected systems. In 1997, he jumped to Ernst and Young, where he oversaw security work for E Commerce systems. But even with all of these accomplishments, Ernst and Young told Kurtz that he's too young to move up to Parker, and Kurtz is already feeling unfulfilled at work. He stares at his computer screen and he knows he should get back to work. But instead he makes a decision. It's time to strike out on his own. So Kurtz leaves Ernst and Young, walking away from a guaranteed salary, benefits, and prestige. In October 1999, he teams up with some former colleagues to start a new company. They call it Foundstone, and the early days are brutal. Kurtz doesn't pay himself for more than six months. He sleeps on a bare mattress on the floor of one co founder's house. Days blur into nights as the team hustles for clients, pitching companies on their vision, combining enterprise security software with advisory services. Their pitch is that they don't just give advice. They also provide software that continuously manages and tracks security vulnerabilities. Word starts to spread, and eventually foundstone takes off. And Curt's bet on himself pays off. In 2004, antivirus giant McAfee comes calling. They want Foundstone, and they're willing to pay $86 million for it. For Kurtz, it's a massive win. And then comes the twist. McAfee wants him, too. They offer him a top worldwide chief technology officer. Kurtz actually turns down the job twice before finally saying yes. Once there, Kurtz realizes the cybersecurity industry is stuck in the past. The biggest names are using outdated software, pushing slow, infrequent updates to machines that are likely already compromised. By the time help arrives. Everything is reactive and installed locally. To Kurtz, this approach feels antiquated. He starts to wonder how cybersecurity could look different if. If it didn't need to live on individual machines. And eventually, the itch to break out on his own returns. Once again, he's ready to leave stability behind and bet on himself. But this time, he's not just starting a company. He's coming for an entire industry. It's around 2011, and George Kurtz is sitting with a colleague, Dmitri Alperovich, in a quiet Silicon Valley lounge. Alperovich is in his early 30s and joined McAfee a little over two years ago as their vice president of threat research, but he's been interested in cybersecurity since he was a kid. Between them, the two men have decades of experience fighting cyber attacks. They also share a growing sense that current methods aren't working. Their conversation starts where it often does, with frustration. Alperovich goes first. Every breach we investigate looks different on the surface, but underneath is the same story. We're chasing malware after the fact. Kurtz chimes in. And meanwhile, customers are drowning in tools. One agent for this, another console for that. None of them are talking to each other. They've both seen the issues firsthand. Companies spending millions on security and still getting hacked. Alperovich continues his rant, yeah, the attackers aren't slowing down either. They're organized. They share intelligence. But defenders are still operating in silos. Kurtz nods his head vigorously and interjects, which is backwards. Defense should get smarter because of every attack, not reset to zero every time. Kurtz comment lands with Alperovich, who nods. Kurtz continues, hey, what if endpoint security worked the same way attackers do? One view, one stream of data. Intelligence built in from the start. You know what I mean? The two men start talking faster, building on each other's thoughts. Yeah, collected once and reused everywhere. Single agent cloud based always on and a unified data layer. So detection, response, threat hunting. They're all drawing from the same source. Kurtz grabs a pen and slides a napkin between them. They sketch out boxes, arrows and flows of data. Years of experience distilled into something simpler. Kurtz continues. If you build it in the cloud, you can move faster than the attackers. Updates can be pushed instantly and globally. The two men sit back and look at what they've drawn. It's not a finished product, not even a business plan. But it's a philosophy, one shaped by everything they've seen go wrong in cybersecurity. You know, what is it about new business ideas and napkins, huh? If you've ever started anything with another person, a company, a food truck, even a simple side hustle, you know, the hardest part isn't the idea, it's the fit. A good partner doesn't just agree with you. There's a kind of give and take that makes the idea sharper. That's what most of these over the napkin moments are really about, right? Stress testing a dream, but also stress testing a team. It's not so different from a couple figuring out a family budget at the kitchen table. Sometimes these moments are more about making sure the partnership is worth the stress of future disagreements. Kurtz and Alperovich's vision becomes a reality in late 2011, when they co found Crowdstrike alongside Greg Marston, the former CFO of Foundstone. In April 2012, they recruit Sean Henry, a veteran cybersecurity expert from the FBI. Henry brings something the others don't deep experience tracking down sophisticated hackers. His years of expertise not only help shape their product, it also lends them instant credibility, and investors start paying attention. With a $26 million investment from private equity firm Oreberg Pincus, Crowdstrike is off and running. Even the name reflects the company's core idea. CrowdStrike is built around crowdsourcing intelligence, pulling in data on cyber attacks from a global network of analysts, then using that shared knowledge to understand who the hackers are, how they operate, and how to stop them before they Strike again. In 2013, CrowdStrike launches its flagship product, Falcon. It's a cloud based program that monitors Windows and Mac systems, looking for intrusions in real time and flagging threats as they emerge because it needs to spot and stop problems quickly. It's kind of like an antivirus software on steroids, tightly integrated into systems so it can actively shut down attacks. As CEO Kurtz becomes the public face of the company, he crisscrosses the globe, pitching Falcon to corporations Governments and institutions worried about losing their most valuable asset, intellectual property. His message is simple but provocative. I think the most important part about stopping an adversary is first to understand you're fighting an adversary, you're not fighting a piece of malware. And that's where the industry's really been focused. What they've been doing is focusing on the digital bullets, as I like to say, and it's equivalent to someone shooting a gun at you in the physical world. And you're asking, was that a 9 millimeter or.45 that went by? You just don't do that. You ask, why is a person shooting at me? How do I actually protect myself? As CrowdStrike fights to gain a foothold in a nascent industry, the company has no idea what's coming next. Within just a few years, a series of stunning high profile attacks will rock the worlds of entertainment and politics, and CrowdStrike will find itself right in the center of the storm. It's June 2014. Just as CrowdStrike is starting to gain traction with new clients, big news breaks out of Washington, D.C. the Justice Department has filed charges against a handful of Chinese government officials. They're accused of hacking into American companies and entities to steal secrets. This is a case alleging economic espionage by members of the Chinese military. The range of trade secrets and other sensitive business information stolen in this case is significant and demands an aggressive response. The charges reveal that Chinese hackers have been quietly breaking into US Companies for seven years, siphoning off trade secrets, corporate strategy, and sensitive data, all while largely going undetected. For CrowdStrike, this is a breakthrough moment. Soon after the indictments are announced, the company launches its own independent investigation. And instead of quietly briefing clients, CrowdStrike does something bold. It goes public public with its findings. The company releases a detailed report laying out exactly how the hackers operated. It even gives the hackers a name, Hutter Panda. According to the report, the hackers targeted professionals in sensitive industries. While they were traveling to conferences. The hackers sent phishing emails disguised as event documents or golf brochures, hence the nickname Putter Panda. When the recipients opened the files, they unknowingly installed remote access tools on their computer, giving the attackers a backdoor into corporate networks. Then an even bigger story erupts just a few months later. In late 2014, North Korea is accused of hacking Sony Pictures Entertainment. Unreleased movies and screenplays are put online, including material from the upcoming James Bond film Spectre. The hackers also post embarrassing emails from Sony executives, including corporate financial details and email exchanges between producers And Hollywood figures the fallout is swift. And Sony chairwoman Amy Pascal is pressured to resign. The attack is widely seen as retaliation for the Interview, a new comedy starring Seth Rogen and James Franco that pokes fun at North Korean dictator Kim Jong Un. The hackers threaten further damage unless Sony cancels the film's release. Suddenly, this isn't just a cybersecurity story. It's a geopolitical one. Hollywood and Washington, D.C. collide, and public officials, including President Obama, weigh in on whether an American company should cave to a foreign government's threat. Ultimately, Sony backs down. They alter the interview to soften its portrayal of North Korea, and they limit the movie's release to a small number of theaters. Once again, CrowdStrike steps in. The company conducts a deep forensic investigation and publicly shares its findings. And the media takes notice. CrowdStrike co founder Dmitri Alperovich jumps at the chance to be interviewed and boost his company's profile. He goes on PBS's NewsHour.