Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Never Let a Good Crisis Go to Waste - CISO's Powerful Take on Security Improvement

Amy Bogac, CISO at Elevate Textiles, shares her candid approach to cybersecurity program management. She emphasizes the importance of distinguishing between immediate fixes and long-term improvements after security incidents. Key insights: Set clear boundaries between incident resolution and continuous improvement Use security incidents as leverage for necessary program investments Learn from every crisis to strengthen your security posture Distinguish between short-term fixes and long-term strategic improvements.

Sue Bergamo - Confidentiality, Integrity, and Availability - CIA Triad

“This isn't a job for the faint of heart. If people can't understand the triad that CISOs abide by—confidentiality, integrity, and availability—then it’s our job to make them understand.” Sue Bergamo Exciting news! In our latest episode of Data Security Decoded, we had the pleasure of hosting Sue Bergamo, CIO and CISO at BTE Partners.

The Hidden Cost of Hospital Cyber Attacks: What Happens to Patients? #Healthcare #DataSecurity

What happens to patients when their local hospital has a ransomware attack? How do you even find that? You collect data on every cyberattack on a healthcare provider. Next, you look at data from Medicare and then overlay those two data sets. Simple. Listen to the latest episode of the @Data Security Decoded podcast, where @Steve Stone is joined by @Hannah Neprash, PhD, Assistant Professor at the University of Minnesota School of Public Health.

Faster Remediation with Data-Centric Security Insights

In this episode of Into the Breach, James Purvis and Mike Schmidt discuss how adopting a data-centric security approach can lead to faster remediation and better alert prioritization. With SOC teams overwhelmed by millions of alerts, they explore how DSPM (Data Security Posture Management) provides visibility, reduces noise, and focuses on protecting sensitive data. Learn how DSPM can help streamline security operations and safeguard your business-critical assets.

Relax, you've got Rubrik in your corner!

With Rubrik Security Cloud, you’ll be unstoppable against cyberattacks. You can protect your data wherever it lives: across the enterprise, in SaaS applications, and in the cloud. You’ll also be able to continuously monitor data risks, and recover data and applications quickly. We take great pride in helping IT and security teams find peace of mind. With Rubrik, your team can rest easy knowing your data is secure and resilient.

Can DSPM Really Help Backup Admins?

In this episode of Into the Breach, James Purvis is joined by Filip Verloy to discuss a rarely explored but highly impactful topic: Can DSPM help backup administrators? Together, they dive into how DSPM enhances visibility, optimizes backup strategies, reduces costs, and strengthens cyber resilience. From managing redundant data to supporting recovery efforts during ransomware attacks, this conversation highlights DSPM's potential to revolutionize traditional backup processes while addressing modern regulatory demands.

The AI Shared Responsibility Model: Who's Job Is It Anyway?

In this episode of Into the Breach, James Purvis and Filip Verloy explore the AI Shared Responsibility Model, a framework introduced by Microsoft. They break down the roles and responsibilities of cloud providers, model providers, and customers in securing AI-powered environments. From understanding the unique challenges of generative AI tools like CoPilot to the importance of proactive data governance, this discussion offers practical insights into navigating AI security today and in the future.