Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

What We Looked for in a DSPM Solution

In this episode of Into the Breach, James Purvis speaks with Fabiano, VP of Engineering, about Rubrik’s acquisition of Laminar's Data Security Posture Management (DSPM) platform. They discuss the rigorous evaluation process of a dozen startups, what made this platform stand out, and how the acquisition has enabled Rubrik to offer the most comprehensive DSPM solution in the market. From alignment in mission to overcoming challenges, Fabiano shares insights into the integration process and the future of data security posture management.

Cybersecurity vs. Cyber Resilience: The Future of Security! #shorts #podcast #datasecurity

"Cybersecurity is a process, but cyber resilience is the outcome. It's about more than managing risk—it's ensuring your organization can withstand and recover from anything." – Kris Lovejoy Cyber resilience is the next step for organizations ready to thrive under pressure. Catch Kris’s insights on with Ghazal Asif. Discover: Why resilience matters more than ever How security fits into the bigger picture Practical steps to build resilience.

Modern Tech Old Systems on the Cloud! #shorts #datasecuritydecoded #cybersecurity #podcast

"If you don’t know what you have, you can’t secure it. And putting a 30-year-old system on the cloud doesn’t make it modern.” – Kris Lovejoy Cybersecurity starts with the basics: inventory and upgrades. Want to future-proof your business? Catch Kris’s insights on now.

Global Cybersecurity Needs Global Standards #shorts #podcast #datasecuritydecoded #cybersecurity

"I’m pro-regulation, but the lack of international standards makes compliance a huge challenge.” - Kris Lovejoy Cybersecurity today isn’t just about protection but navigating a fragmented regulatory landscape. Kris explains why standardization is key to resilience. Catch her insights on! Key Points: Why regulations matter Challenges of global compliance Building resilience across borders.

Regulatory Readiness & Resilience with Kris Lovejoy, Global Security Leader at Kyndryl

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Data Security's Low Hanging Fruit: Redundant, Obsolete, and Trivial Data

In this episode of Into the Breach, James Purvis and Drew Russell tackle the growing issue of ROT data - redundant, obsolete, and trivial data - and its impact on both security and costs. They discuss how CISOs can achieve a win-win by reducing risk and hard costs through effective data management. From cloud migration to legal implications, they explore practical strategies to identify, manage, and eliminate ROT data for a more efficient and secure organization.

Why You Can't 'Opt Out' of Cyber Policy #shorts #datasecuritydecoded #podcast

Public Policy Moves Forward With or Without You Waiting for your preferred party to take power before engaging in cyber policy isn't just ineffective – it's a missed opportunity to shape critical decisions that affect everyone. Public policy continues to evolve regardless of who holds office, and the cybersecurity landscape waits for no one.

Bridging Cyber Policy Gaps for Rural and Underserved Communities with Nicole Tisdale

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

The REAL Impact of Hospital Cyberattacks, It's More Than Just 'Rescheduling #shorts #cybersecurity

When hospitals say "procedures were rescheduled" after a cyberattack, they're missing the human cost. For many patients, a medical appointment isn't just a calendar entry – it's arranged time off work, transportation plans, aftercare support, and lost wages. These disruptions hurt vulnerable communities the most and damage the essential trust between healthcare providers and their patients.

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.