Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Rose by Any Other Name: Exposure Management, a Category that Evolved from Vulnerability Management

As organizations increase their reliance on cloud services, remote work tools, IoT devices and smart infrastructures, and the use of third-party vendors, their exposure to cyber threats increases. Traditional approaches to vulnerability management are unable to keep up with rapidly changing business needs and an expanding attack surface. While scanning and patching known vulnerabilities remains critical, today’s complex threat landscape demands a more comprehensive strategy.

Leverage generative AI securely with Rubrik DSPM

Don’t let poor data visibility stop you from innovating. According to Rubrik Zero Labs, 98% of organizations report significant data visibility challenges. Rubrik DSPM gives you the control you need to reduce the risk of data exfiltration and minimize the impact of. Check out our YouTube channel to find out how you can leverage generative AI securely and prevent sensitive data leakage with Rubrik DSPM.

FedRAMP ConMon vs Audits: What's the Difference?

A lot goes into protecting the information security of the nation. The National Institute of Standards and Technology, NIST, maintains a list of security controls under the banner of NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations. Meanwhile, the Federal Risk and Authorization Management Program, or FedRAMP, sets up a framework that makes those security controls apply to governmental agencies and the third-party cloud service providers that work with them.

AI Security is API Security: What CISOs and CIOs Need to Know

Just when CIOs and CISOs thought they were getting a grip on API security, AI came along and shook things up. In the past few years, a huge number of organizations have adopted AI, realizing innumerable productivity, operational, and efficiency benefits. However, they’re also having to deal with unprecedented API security challenges. Wallarm’s Annual 2025 API ThreatStats Report reveals a staggering 1,025% year-on-year increase in AI-related API vulnerabilities.

Using Exposed Ollama APIs to Find DeepSeek Models

The explosion of AI has led to the creation of tools that make it more accessible, leading to more adoption and more numerous, less sophisticated users. As with cloud computing, that pattern of growth leads to misconfigurations and, ultimately, leaks. One vector for AI leakage is exposed Ollama APIs that allow access to running AI models. Those exposed APIs create potential information security problems for the models’ owners.

What is a Tailgating Attack? Understand This Sneaky Security Threat

Imagine yourself entering your office building and, as you open the door, someone appears right behind you, behaving as if they belong there. Without a doubt, you let them in because you believe they are an employee. What if, however, that individual is a malevolent intruder? This is the fundamental idea behind a tailgating attack, a social engineering technique in which an unauthorized person uses human decency and trust to enter a restricted location.