CrowdStrike adds new partners to cybersecurity coalition

By Joshua Gliddon on May 22, 2026 1:00PM
CrowdStrike adds new partners to cybersecurity coalition
Daniel Bernard, CrowdStrike.
Supplied

CrowdStrike’s Project QuiltWorks, a coalition of ecosystem partners brought together to assess, prioritise, and continuously remediate the wave of vulnerabilities in production code now being discovered by frontier AI models, has added new members.

Armadin, Cognizant, HCLTech, Infosys, KPMG, NTT DATA, Tata Consultancy Services (TCS), and Wipro Limited are joining the existing 'frontier labs' and systems integrators who joined the coalition when it began in late April.

Powered by frontier models from OpenAI and Anthropic, Project QuiltWorks combines CrowdStrike’s AI-driven vulnerability discovery and adversary-informed prioritisation with remediation services from Accenture, EY, IBM Cybersecurity Services, and Kroll.

Armadin's AI attacker will integrate with the CrowdStrike Falcon platform, delivering safe and continuous agentic hyperattacks across an enterprise's infrastructure, identity, and endpoints. Through Project QuiltWorks, Armadin surfaces an organisation's AI risk while CrowdStrike's experts and ecosystem of partners prioritise what's exploitable and remediate what's exposed.

CrowdStrike also announced it is pushing Project QuiltWorks forward with the integration of Anthropic’s Opus 4.7 AI model across its Falcon platform, claiming the integration enhances its advanced vulnerability discovery capabilities.

"QuiltWorks proved that frontier AI can find what traditional tools miss, and partners saw the results,” said Daniel Bernard, chief business officer, CrowdStrike.

“Now, more of the industry is joining the coalition to deliver AI-powered discovery, adversary-informed prioritisation, and remediation at enterprise scale."

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © nextmedia Pty Ltd. All rights reserved.

Add techpartner.news as your trusted source

Tags:

Log in

Email:
Password:
  |  Forgot your password?