Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.

Introducing 1Password 8 for iOS and Android

1Password has been rebuilt from the ground up for iOS and Android. It's everything you need for a worry-free digital life on the go. Make it yours with a customizable home screen. Stay in the know with the Watchtower dashboard. 1Password for iOS and Android is all-new with a fresh, modern design and the most personal experience we’ve ever built for mobile.

Abusing Google Sites and Microsoft Azure for Crypto Phishing

Throughout 2022, Netskope Threat Labs found that attackers have been creating phishing pages in Google Sites and Microsoft Azure Web App to steal cryptocurrency wallets and accounts from Coinbase, MetaMask, Kraken, and Gemini. These phishing pages are linked from the comment sections of other websites, where the attacker adds multiple links to the phishing pages, likely to boost SEO and drive victims directly to these pages.

Are SASE and Zero Trust the key for manufacturers grappling with IoT cyber risks?

As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses, and across supply chain infrastructure is exploding. Manufacturers seek to utilize IoT in a range of places, be it video camera inspection devices on the assembly line, temperature sensors on refrigeration units, or maintenance telemetry sensors on factory equipment.

Say hello to 1Password 8 for iOS and Android

Sometimes I forget to marvel at what we, as an industry, have built in the past 30 years. I have this little device in my pocket, and a slightly larger version on my nightstand. With either one, I can video chat with a friend in the UK, access my medical records, or check in for a vet appointment. I can track my workouts or reserve a table at my favorite restaurant.

Rubrik Ranked #31 on the 2022 Forbes Cloud 100

Rubrik is honored to again be named to the Forbes Cloud 100, the annual ranking of the top private cloud companies in the world. This list is comprised of some of the most respected and fastest-growing companies globally. We’re humbled to be alongside these innovative brands and to make this prestigious list for the sixth year in a row! As the pioneer in Zero Trust Data Security™, this recognition underscores Rubrik’s continued cybersecurity momentum.

AWS re:Inforce 2022 recap

If you’re looking to catch up on what happened at this years AWS re:Inforce, this is the blog for you. There were many important announcements were this year, including some exciting updates on the cloud security front. In this post, we’ll quickly review the goals of the conference and who should attend, before diving into the keynote highlights, software updates, and helpful resources.

The Importance of a Machine Learning-Based Source Code Classifier

This is the fifth in a series of articles focused on AI/ML. Source code is a critical part of an organization’s intellectual property and digital assets. As more and more centralized source code repositories are moving to the cloud, it is imperative for organizations to use the right security tools to safeguard their source code.