The systems that crashed are the responsibility of their owners. They subcontracted the updating of their systems to a third party without apparently ensuring that there was adequate testing and change control.
Be careful when blaming the victim. Where I work, we don't automatically install the latest file from CrowdStrike. We use n-1 for some machines and n-2 for others. We (people smarter than me) planned for this exact situation. We still got hit, hard.
I have a theory as to what happened, but it's just a theory and I'm not ready to add to the rumor mill.
Suggestion, no disrespect, do your own testing. On all products, not just CS. Create a mock "Dev" environment, think an island, that represents your enterprise at a small scale, and use it for testing.
Didn't say that isn't a lot of work, it is. But it's saved me headaches.
Also, no disrespect to CS, having a behavior-learning SEIM is your best friend, and a good network response team to go with it. These one solution in a box tricks, they're simply no match against a skilled opponent (they're quite good against script kitties though, which sure, is most "APT" like threats, but patching and hardening solves that too, what a thought). Behavior based SEIMs on the other hand? They're REALLY good at detection. Trouble is, is anyone watching, caring, and know how to respond? Or willing / able to do even a behavior based SEIM? Side note, many vendors provide behavior based SEIM solutions, labeled as "next-gen IDS, next-gen Firewall" etc. Think Cisco with bundling SNORT in their firewalls if you pay the licensing. You still need to tie the SNORT data to say SPLUNK, to have it weighted for behavior analytics or else simply having SNORT is worthless in my experience (no disrespect)
Regarding theories for rumor mill... Things have certainly been "different" this year than prior. The sheer number of Azure outages, without an after action report from Microsoft at that, are alarming. And that's just Microsoft.