Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cross Account Replication of AWS RDS with Rubrik Security Cloud

The Relational Database Service (RDS) service offered by AWS is one of the most popular databases today. A lot of critical, confidential data resides inside of RDS. Hence it becomes imperative to protect this data from various threats and ensure that the data is secure. Our approach to protecting the data inside RDS is based on two aspects: Rubrik already supports a modern approach to safeguarding RDS data from an operational perspective and also maintains a clean, secure copy in a different region.

End to End Trust Building in Sharing Economy- How KYC is crucial

The sharing economy is a comparatively recent economic idea, yet it is fast increasing. It’s predicted to reach $335 billion by 2025. eBay was the first widely known sharing economy platform with online P2P buying and selling. After more than two decades of eBay, the sharing economy offers other solutions also, such as ride-sharing, crowdfunding, apartment sharing, and many others.

How Cyber Security Helps Identify Internet Frauds and Crimes

We all know that cybersecurity is an application of technologies that protect systems, networking programs, devices, and data from cyber-attacks. There are many cases of fraud reported every year. People who are using different networks want to keep themselves safe from online crime. In order to achieve this security, there is no need to heavily invest and hire computer experts; you can achieve it through cybersecurity.

The Attacker's Toolkit: Ransomware-As-A-Service

Security threats evolve just as fast as the technologies used to stop them. New and modified attack strategies are constantly in the works. To make matters worse, the attack surface within corporate networks is expanding. The push to work from home increased vulnerable points of entry by introducing multitudes of new endpoint devices. The move to cloud-based services and infrastructure has further resulted in a broader and more challenging landscape to defend.

Analysis of Clop's Attack on South Staffordshire Water - UK

On August 15, the Clop ransomware group announced on their leak website the breach of South Staffordshire Water, a privately owned UK water supply company. This attack is yet another example of ransomware gangs targeting critical infrastructure expecting to receive a big payout, which is reminiscent of hundreds of previous incidents, including the well-known Colonial Pipeline and JBS attacks.

The dangers of assert in Python

There are many ways to find bugs in Python code: the built-in debugger (pdb), a healthy amount of unit tests, a debugger in an IDE like Pycharm or Visual Studio, try/catch statements, if/else statements, assert statements, or the tried and true practice of covering every inch of your codebase in print() statements like it’s going out of style. Assert statements can help us catch bugs quickly and are far less intrusive than copious amounts of print statements.