Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik

Securing Sensitive Patient Data in Healthcare with Hannah Neprash, PhD

NEWS: Cyber Security Decoded is now Data Security Decoded! In this episode of the podcast, our host and Head of Rubrik Zero Labs, Steve Stone, is joined by Dr. Hannah Neprash, a health economist whose research focuses on the delivery and financing of healthcare. Steve and Dr. Neprash discuss the findings in Rubrik Zero Labs' new report, “The State of Data Security: Measuring Your Data’s Risk,” and focus on the aspects of the report, specifically calling out the cyber threats and vulnerabilities facing healthcare organizations.

Shamane Tan on cyber resilience - Cyber Security Decoded

Bouncing back from a cyber incident, data breach or #ransomware attack is a great accomplishment…but how can you bounce forward? A complete Cyber Resilience strategy is mission-critical. Security teams should be proactive and have response plans in place for when #CyberAttacks hit, rather than attempting to prevent attacks from occurring. With a #CyberResilience strategy, your team will be equipped with a plan when a cyber incident occurs while also having tools to identify those malicious attacks before they happen.

Secure and Recover Your IBM AIX Data with Rubrik Security Cloud

Safeguard your critical business data on IBM AIX servers with Rubrik Security Cloud. This video guides you through securing your AIX environment using Rubrik's comprehensive data protection and cyber resilience solution. Key benefits you'll discover: Centralized Management: Gain unified visibility and control over your entire IT infrastructure, including cloud, on-premises, and SaaS workloads, from a single, intuitive Rubrik dashboard.

Shamane Tan on rising up - Cyber Security Decoded

Inspirational words from Shamane Tan on Cyber Security Decoded…as you climb your personal ladder to success, you should be your biggest cheerleader! There won’t always be someone there to recommend you for promotions or point you in the right direction. People come and go, and opportunities arise and vanish. That’s why in order to grow, whether it’s in the #CyberSecurity industry, the broader #Technology industry, or elsewhere, you must always be proactive in seeking out new ways to grow personally and professionally!

Analysis: FBI's FY23 Cybercrime Report Shows Two Tactics Are On The Rise

I started my career as a Counterintelligence Special Agent in the U.S. Army, quickly learning how to decode the complex signals of security threats. Next, I sharpened my skills in state law enforcement, investigating (and preventing) cybercrime by identifying and mitigating digital threats.

Accelerating Ransomware Recovery with Rubrik Threat Hunting for U.S. Government

At this point, it is clear: cyber attacks from nation-state adversaries persistently threaten local, state, and federal governments, as well as educational institutions. It is not a matter of if bad actors can penetrate existing security controls, as they are already doing so and will continue to do so. Whether it is due to one unpatched machine or one user clicking on a link in an email, we believe cyberattacks are inevitable.

Shamane Tan on professional growth - Cyber Security Decoded

On Cyber Security Decoded, Shamane Tan reflects on those who have shown her support during her career, and emphasizes the importance of giving back to others who are just starting out in #CyberSecurity. If you’re getting started in the #technology industry, seeking out mentorship can be vital for your career and building a ladder. And if you’re a leader, giving back by sharing your experiences by those looking to find a career path can be very rewarding and contribute to the overall success and growth of your organization.

Find Lurking Threats Early with Rubrik Threat Monitoring

Your backup data hosts valuable information that can be used to identify potential attacks. In this demo, we will show you how Rubrik Threat Monitoring combines intelligence from third-party threat feeds with proprietary intelligence from Rubrik Zero Labs and Rubrik’s InfoSec team to automatically identify indicators of compromise (IOCs) within backup data.

Shielding Your Kubernetes Kingdom: Safeguarding with Rubrik Protection

In the landscape of modern application development and deployment, Kubernetes has transcended its adoption phase to become a cornerstone technology for organizations worldwide. According to the Cloud Native Computing Foundation (CNCF), a staggering 96% of organizations are actively using or evaluating Kubernetes, with over 5.6 million developers worldwide embracing its capabilities.