Escaping the Black Hole: Engineering ML Pipelines That Defy Data Gravity
For years, we’ve heard the mantra that data is the new oil, a valuable resource to be extracted and refined. But any IT director managing a growing...
3 min read
Nick Stevens : Updated on March 6, 2026
On Friday, July 19, 2024, Microsoft Windows devices worldwide began crashing, quickly becoming unusable, as they experienced the infamous Blue Screen of Death (BSOD). Early news reports all mentioned Microsoft but often left the culprit, CrowdStrike, a leading security software, out of many headlines. This incident impacted thousands of businesses across various industries, causing operational disruptions and highlighting vulnerabilities in incident response plans. Here’s a detailed look at what happened, the timeline of events, and the lessons learned.
CrowdStrike released a flawed and untested update to its Falcon endpoint protection software. Almost immediately, reports of Windows devices crashing and displaying the BSOD started to be reported. The issue was traced back to a conflict between the CrowdStrike update and specific Windows system files, causing critical system errors and rendering devices inoperable.
The CrowdStrike BSOD issue had a far-reaching impact, affecting various sectors, including transportation, healthcare, finance, retail, and manufacturing. The number of impacted devices is estimated to be at least 8.5 million according to estimates from Microsoft, disrupting business operations and causing significant financial losses.
The CrowdStrike BSOD incident is a clear reminder that even trusted security solutions can cause significant disruptions. Here are some key takeaways:
While CrowdStrike acted quickly to address the issue, there are several areas where improvements could have been made:
This incident isn’t just about CrowdStrike; it underscores a broader issue that many companies could face. Ensuring robust incident response plans and maintaining open communication channels are essential practices for all organizations.
In response to the CrowdStrike BSOD issue, several fixes were provided by Microsoft and other experts in the community. Here are the key solutions:
For a more detailed breakdown of the technical fixes, visit the following sources:
The CrowdStrike BSOD disaster serves as a critical learning moment for both vendors and organizations. Ensuring comprehensive testing, robust incident response plans and clear communication can help mitigate the impact of such incidents in the future. As updates continue to emerge, we will keep you informed with the latest information and best practices.
Stay tuned for more updates as we continue to monitor the situation and gather insights from industry experts.
For years, we’ve heard the mantra that data is the new oil, a valuable resource to be extracted and refined. But any IT director managing a growing...
If you run a business in Portland, there is a good chance you have felt at least one of these in the last year:
The OCPA is Here to Stay: What Portland Businesses Need to Know in 2026 When the Oregon Consumer Privacy Act (OCPA) first went into effect in July...
As 2024 wraps up, it’s crucial for businesses to secure their cybersecurity defenses against the risks that peak during the holiday season. With...
In today’s digital age, organizations of all sizes are at risk of cyber attacks. Cybersecurity breaches, whether caused by a malicious insider or an...
Hackers recently released a list of nearly half a million Fortinet VPN usernames and passwords onto the Dark Web. The group behind the attack claims...