Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

opsdemon

Latest posts

Embracing Conscious Leadership and Generative AI Transformation with Aysha Khan of Treasure Data

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Enhancing Data Security and Privacy with Protecto's AI-Powered Tokenization

The inherently non-deterministic nature of AI inputs, processing, and outputs multiplies risks, making traditional data protection methods insufficient. In the enterprise world, unstructured data—brimming with sensitive information such as Personally Identifiable Information (PII) and Protected Health Information (PHI)—poses a significant challenge, especially as this data flows into AI agents.

The Developer's Guide to the Cyber Resilience Act

In February 2024, Change Healthcare, one of the biggest IT solution companies in the U.S. healthcare system, suffered from a ransomware attack resulting in a complete shutdown of their IT system. Because of this attack, hospitals and pharmacies experienced interruptions in patient treatments, as well as in payments for several weeks. This is a nightmare for any software developer, security engineer or a company.

Building a Resilient Network Defense with Network Based Intrusion Detection Systems

Network based Intrusion Detection System (NIDS) is an important layer of security in the cybersecurity world. It essentially acts as a proactive guard, constantly scrutinizing network traffic activity — watching the data packets that travel across your devices for patterns that suggest signs of unauthorized access and other malicious behavior.

A Comprehensive Look into Password Attacks and How to Stop Them

There are some things you want to keep private such as your bank account number, government ID number, etc. In the digital age, that includes the passwords that protect these accounts because once your account credentials are compromised, cybercriminals can get that information. That is why password attacks have become so prominent today.

Confidential computing at 1Password

At the heart of 1Password’s security model is our use of end-to-end encryption. This means that your passwords and other secrets are encrypted on your device before being sent to the cloud. Without your encryption keys (derived from your account password and Secret Key), it’s cryptographically impossible for anyone to read your data, even us at 1Password.