About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

CrowdStrike Delivers a New Era of Operational Threat Intelligence, Personalized to Each Customer Environment

Latest Falcon Adversary Intelligence release embeds real-time, customized insights into analyst workflows, accelerating detection, investigation, and response

Black Hat USA 2025, Las Vegas – CrowdStrike (NASDAQ: CRWD) today introduced a breakthrough in how organizations consume and act on threat intelligence: delivering real-time, personalized adversary insights into analyst workflows and aligning threat intelligence to each customer's environment, exposures, and detections. CrowdStrike has long set the industry standard for adversary intelligence, tracking more than 265 of the world’s most sophisticated nation-state, eCrime and hacktivist groups. This latest release of CrowdStrike Falcon® Adversary Intelligence operationalizes threat intelligence at scale, turning elite adversary insights into immediate, decisive action.

Security teams are overwhelmed by fragmented intelligence spread across disconnected tools, lacking the context required to rapidly understand how the adversary threat applies to their organization’s unique risk profile and technology environment. At the same time, adversaries continue to grow in sophistication, weaponizing AI to accelerate attacks at scale, while also targeting the AI systems and autonomous agents driving modern business operations. Defenders need intelligence that is accurate and hyper relevant to their unique environments – available to them in real-time.

Falcon Adversary Intelligence replaces fragmented tools, static feeds, and manual research with customized intelligence driven by the CrowdStrike Falcon® platform’s first-party telemetry. By combining a deep understanding of adversary tradecraft with real-time insight into each customer’s assets, exposures, and detections, CrowdStrike uniquely delivers prioritized, high-fidelity intelligence personalized to each organization's unique risk profile. CrowdStrike is transforming the way organizations consume and operationalize threat intelligence through:

  • Automated Onboarding and Intelligent Rule Creation: Using infrastructure mapping and other customer knowledge from across the Falcon platform, the system dynamically leverages each organization’s risk profile to deliver personalized intelligence – reporting on relevant threats and trends, tracking activity on the dark web, and surfacing the most relevant information based on industry, tech stack, and detections.
  • Platform-driven Prioritization with Contextual Threat Profiles: Threats are prioritized based on real-time detections, active exposures, and company profile. For example, when a new threat is identified targeting a customer’s industry – including the adversary behind it, recent campaigns, and recommended response – it is automatically elevated. Each threat includes a high-fidelity profile with attribution, TTPs, targeting patterns, and intrusion sets, giving analysts the full context to act quickly and decisively.
  • Threat Hunting Guides: Available in Falcon Adversary Intelligence Premium, analysts can now pivot instantly from insights to targeted Hunting Guides to detect a threat across their environment. Prebuilt queries and guided workflows – directly linked with intelligence – eliminate the need to manually research adversaries, build queries, or stitch together context, reducing a 10–15 step investigation to a few clicks. When paired with Falcon® Next-Gen SIEM, click-to-hunt workflows further reduce manual effort and enable rapid, informed response to emerging threats.
  • Intelligence Built for SOC Workflows: Intelligence Explorer provides a unified workspace to investigate threats, pivot across adversary context, and correlate detections in one view.

“Today’s adversaries are treating speed and stealth like weapons, using GenAI, cross-domain attacks, and targeted social engineering to move faster than ever while staying undetected,” said Adam Meyers, head of counter adversary operations at CrowdStrike. “Threat intelligence can’t just inform – it has to drive action. This is a smarter, more dynamic way to deliver intel aligned to each customer’s environment. By boosting relevance, accelerating response, and delivering real operational ROI, analysts can act faster, hunt smarter, and stay ahead of today’s most sophisticated threats.”

For more information, read our blog, visit us online, or stop by the CrowdStrike Black Hat booth #2733.

About CrowdStrike

CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

Learn more: https://www.crowdstrike.com/

Follow us: Blog | X | LinkedIn | Facebook | Instagram

Start a free trial today: https://www.crowdstrike.com/free-trial-guide/

© 2025 CrowdStrike, Inc. All rights reserved. CrowdStrike and CrowdStrike Falcon are marks owned by CrowdStrike, Inc. and are registered in the United States and other countries. CrowdStrike owns other trademarks and service marks and may use the brands of third parties to identify their products and services.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.