Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik

The AI Shared Responsibility Model: Who's Job Is It Anyway?

In this episode of Into the Breach, James Purvis and Filip Verloy explore the AI Shared Responsibility Model, a framework introduced by Microsoft. They break down the roles and responsibilities of cloud providers, model providers, and customers in securing AI-powered environments. From understanding the unique challenges of generative AI tools like CoPilot to the importance of proactive data governance, this discussion offers practical insights into navigating AI security today and in the future.

Leverage generative AI securely with Rubrik DSPM

Don’t let poor data visibility stop you from innovating. According to Rubrik Zero Labs, 98% of organizations report significant data visibility challenges. Rubrik DSPM gives you the control you need to reduce the risk of data exfiltration and minimize the impact of. Check out our YouTube channel to find out how you can leverage generative AI securely and prevent sensitive data leakage with Rubrik DSPM.

AI Powered Data Classification: A Game Changer or Just Hype?

In this episode of Into the Breach, James Purvis, Drew Russell, and Dan Eldad dive into the exciting yet complex world of AI-powered data classification. Is it truly a game changer, or just overhyped? They explore the potential of AI to revolutionize data classification, its limitations, and where traditional methods still hold value. The discussion also covers practical use cases, cost implications, and the future of AI in data security.

Cybersecurity vs. Cyber Resilience: The Future of Security! #shorts #podcast #datasecurity

"Cybersecurity is a process, but cyber resilience is the outcome. It's about more than managing risk—it's ensuring your organization can withstand and recover from anything." – Kris Lovejoy Cyber resilience is the next step for organizations ready to thrive under pressure. Catch Kris’s insights on with Ghazal Asif. Discover: Why resilience matters more than ever How security fits into the bigger picture Practical steps to build resilience.

What We Looked for in a DSPM Solution

In this episode of Into the Breach, James Purvis speaks with Fabiano, VP of Engineering, about Rubrik’s acquisition of Laminar's Data Security Posture Management (DSPM) platform. They discuss the rigorous evaluation process of a dozen startups, what made this platform stand out, and how the acquisition has enabled Rubrik to offer the most comprehensive DSPM solution in the market. From alignment in mission to overcoming challenges, Fabiano shares insights into the integration process and the future of data security posture management.

Modern Tech Old Systems on the Cloud! #shorts #datasecuritydecoded #cybersecurity #podcast

"If you don’t know what you have, you can’t secure it. And putting a 30-year-old system on the cloud doesn’t make it modern.” – Kris Lovejoy Cybersecurity starts with the basics: inventory and upgrades. Want to future-proof your business? Catch Kris’s insights on now.

Global Cybersecurity Needs Global Standards #shorts #podcast #datasecuritydecoded #cybersecurity

"I’m pro-regulation, but the lack of international standards makes compliance a huge challenge.” - Kris Lovejoy Cybersecurity today isn’t just about protection but navigating a fragmented regulatory landscape. Kris explains why standardization is key to resilience. Catch her insights on! Key Points: Why regulations matter Challenges of global compliance Building resilience across borders.

Regulatory Readiness & Resilience with Kris Lovejoy, Global Security Leader at Kyndryl

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Data Security's Low Hanging Fruit: Redundant, Obsolete, and Trivial Data

In this episode of Into the Breach, James Purvis and Drew Russell tackle the growing issue of ROT data - redundant, obsolete, and trivial data - and its impact on both security and costs. They discuss how CISOs can achieve a win-win by reducing risk and hard costs through effective data management. From cloud migration to legal implications, they explore practical strategies to identify, manage, and eliminate ROT data for a more efficient and secure organization.