Take that! And rewind it back! We built Rubrik Agent Rewind to help enterprises unleash AI without risk by providing visibility, control, and recovery capabilities for AI agents.
Welcome to Data Security Decoded. In this episode, Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, for a focused look at how identity-driven threats are redefining modern security. Drawing insights from Rubrik Zero Labs’ latest report, Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats, Joe explains why identity has become the new perimeter in an era where hybrid and multi-cloud environments dominate.
Learn about the shift from physical to virtual data centers in the 2000s and the rise of ransomware attacks that take advantage of security blind spots (e.g. lack of endpoint protection) to target hypervisors and breach your data. Learn why you need to shift from prevention only to cyber resilience for stronger defenses against modern adversaries (Scattered Spider, UNC5112, and others). Rubrik can help.
Building faster won’t make your software safer. Before launching the next release, ask if your market rewards speed or security. Most breaches begin with misaligned incentives, not faulty code. Shift the economics, lead with accountability, and make protection part of your business DNA.
Most people don’t realize it, but software is what economists call a credence good, you can’t easily judge its quality before or after you buy it. That means organizations are often running on code they can’t fully evaluate for security or reliability.
Our economy, healthcare, energy, and even water systems are powered by software. But here’s the hard truth is that most of that software is built insecurely. And that’s why cyberattacks keep growing in scale and impact. When code underpins everything we rely on, every flaw becomes a national risk.
Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Lauren Zabierek, Senior Vice President for the Future of Digital Security at the Institute for Security and Technology. A former CISA leader and long-time national security professional, Lauren unpacks the principles of Secure by Design, Secure by Default, and Secure by Demand and how these frameworks are reshaping the software supply chain.