Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Breaking into Cybersecurity: A Military Veteran's Journey

Getting into cybersecurity can seem daunting, but for military veterans, it's a natural transition. In this video, we follow one veteran's journey as they use their resettlement money to fast-track their career in cybersecurity. From getting the basics with certifications like CompTIA Security Plus and Network Plus to eventually obtaining their CISSP, watch as they navigate the world of cyber security and share their insights and surprises along the way.

Cyber Security Decoded feat. Suzette Kent | Episode 2

Cyber Security Decoded is a series hosted by Head of Rubrik Zero Labs Steve Stone where he sits down with IT and Security luminaries to discuss key findings from the research from Rubrik Zero Labs and expand on the implications and lessons for IT and security leaders and practitioners. In this episode, Steve sat down with the Former Federal CIO for the United States government, Suzette Kent, to discuss the private and public sector partnerships, the "cyber poverty line," and more.

What is an API Gateway?

In a nutshell, the API gateway accepts API calls and aggregates the requests to the various required services. It serves as a bridge between internally used web unfriendly protocols and web protocols that users understand. Though API gateways provide basic API security controls, they unfortunately are not enough to adequately protect your business from API specific threats.

Cyber Security Decoded feat. Wendi Whitmore | Episode 1

Cyber Security Decoded is a series hosted by Head of Rubrik Zero Labs Steve Stone where he sits down with IT and Security luminaries to discuss key findings from the research from Rubrik Zero Labs and expand on the implications and lessons for IT and security leaders and practitioners. In this episode, Steve sat down with the SVP of Unit 42 at Palo Alto Networks, Wendi Whitmore, to discuss the cybersecurity landscape, the rise in threats from foreign actors, and more.

Entity Collection Overview

The current tempo in information security is getting increasingly faster. We continue to chase quicker detections and faster responses. But does that align with reality? Troves of data is being ingested at wire speed w/filtering, comparing, correlating, identifying, and other transform operations in the event lifecycle. This comes with an increased risk of missed events/alerts, indiscernible log activity from various origins, and the potential for analysis paralysis/desensitization/burnout…

Why Veterans Make Great Infosec Professionals

Infosec is a demanding field that requires individuals to be adaptable, quick-thinking, and able to handle difficult situations. In this video, James Rees explores why veterans are well-suited for infosec careers, with their unique experiences and skill sets making them ideal candidates for the industry. From their ability to handle high-pressure environments to their willingness to take on challenging subject matters, find out why veterans are making a big impact in infosec.