Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Rubrik Announces Integration With Microsoft Information Protection (MIP) Sensitivity Labels

We are excited to announce that Rubrik DSPM now supports Microsoft Information Protection (MIP) sensitivity labels. This integration helps our joint customers to better track and secure files with sensitive data – both within and outside of Microsoft environments. MIP labels are used by organizations to map sensitive data within their Microsoft environment, control access to that data, and enable protection settings such as encryption.

Amazon S3 Data Protection: The Myths and the Facts

So, you’re all set up with Amazon Simple Storage Service (Amazon S3), because you’re looking for best-in-class solutions for your company’s structured and unstructured data. Smart. But there’s more to do. Here are some myths about your Amazon S3 data, the real story behind them. Phew! We’re glad you agree that your Amazon S3 data needs strong protection. Wise decision. Here’s where we can help with a faster, cheaper, better solution.

Hunt for Threats Within Backups to Minimize Data Loss and Downtime

Mike Tyson famously said, “Everybody has a plan until they get punched in the mouth.” After falling victim to a cyberattack, it is crucial for organizations to respond promptly and effectively to minimize damage, recover operations, and prevent future incidents. One of the most critical elements of responding to an incident is the recovery and restoration of affected systems so that business as usual can be restored as quickly and safely as possible.

Rubrik Expands Data Access Governance (DAG) Solution with New Identity Inventory

In a recent Fortune article, Amazon’s chief security officer, Steve Schmidt, suggests 6 questions every company's board should ask its CISOs to understand how robust their cybersecurity preparation is. One of the most challenging questions for CISOs was: “Who has access to what data? Why do they need it, and for how long?” This question is critical because cyberattacks often begin with weak, leaked, or stolen passwords.

Understanding and Mitigating Snowflake Data Risks Amid Increased Cyber Threat Activity

In today's digital landscape, data security is more crucial than ever. Recently, Snowflake, a leading cloud data platform, has observed a significant uptick in cyber threat activity targeting some of its customers' accounts. This development has prompted an in-depth investigation to understand and mitigate these risks.

Behind the Scenes: How Rubrik's System Engineers deliver confidence to its customers

At Rubrik, our mission is to secure the world’s data. Data is complex and it comes in many forms (structured, unstructured, sensitive, transient, etc. ) and it is critical for every enterprise to protect it. Our systems that backup and store huge amounts of data also get subjected to extreme situations – enormous scale & stress, aging and faults.

Analysis: FBI's FY23 Cybercrime Report Shows Two Tactics Are On The Rise

I started my career as a Counterintelligence Special Agent in the U.S. Army, quickly learning how to decode the complex signals of security threats. Next, I sharpened my skills in state law enforcement, investigating (and preventing) cybercrime by identifying and mitigating digital threats.

Accelerating Ransomware Recovery with Rubrik Threat Hunting for U.S. Government

At this point, it is clear: cyber attacks from nation-state adversaries persistently threaten local, state, and federal governments, as well as educational institutions. It is not a matter of if bad actors can penetrate existing security controls, as they are already doing so and will continue to do so. Whether it is due to one unpatched machine or one user clicking on a link in an email, we believe cyberattacks are inevitable.