Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RPM Global Streamlines Operations and Enhances Data Security with Rubrik

RPM Global, a leading ASX-listed mining advisory and software company, turns to Rubrik for operational resilience. Challenged by a phishing attack on its core business unit in the past, RPM Global now leverages Rubrik’s comprehensive product suite, including M365 Protection, Rubrik Cloud Vault, and Edge, to safeguard its most valuable asset - customer data.

Rewind in 5: Cato's 2025 So Far

We're halfway through the year, and Cato’s momentum hasn’t slowed. From major platform upgrades to cutting-edge security enhancements, 2025 has already delivered a wave of innovation. This short video recap distills the biggest highlights into under five minutes — a quick way to catch up on everything new and noteworthy. Watch the recap and let us know which release made the biggest impact for you.

Top Security Threats Worldwide Q1 2025

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q1 2025 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and mid-sized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

Now on AWS Marketplace: CyberArk Enterprise Support for cert-manager

Running Kubernetes on Amazon EKS? You’re likely already using cert-manager—the open source standard for TLS and mTLS certificate automation in Kubernetes clusters. Today, we’re excited to announce that CyberArk Enterprise Support for cert-manager is now available through AWS Marketplace, giving EKS customers a direct path to operational reliability, compliance, and expert support at scale.

SOC Burn Out Is Real: Improve Detection Without the Noise

“Too many alerts mean missing the real threats.” Alert fatigue is one of the top threats to a SOC’s performance. When everything looks like a threat, nothing does. The tradeoff is disabling rules, overly tuning rules, or simply ignoring alerts just to stay afloat. The risk? High-value, low-noise threats slip through the cracks.

The privacy illusion: when deleting your data doesn't actually delete your data

Let’s talk about privacy—specifically, the kind you thought you had when you hit “delete.” OpenAI received a court order to retain every single ChatGPT conversation, even the ones you erased. Yep. Even the awkward ones. Even the ones that start with, “Hypothetically, if I were to…” Why? Because The New York Times is suing them over copyright, and now everyone’s deleted chats are potential evidence.

Unlock the CISO Secrets: From Developers to the Boardroom! #podcast #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.