Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Hunting malware with Amazon GuardDuty and Sysdig

With the constant threat of malware weighing on cloud teams, AWS is introducing new ways to identify malicious software with Amazon GuardDuty. Amazon GuardDuty Malware Protection, a fully managed malware detection service launched today at Re:inforce by AWS, provides agentless scanning to identify when suspicious activity occurs.

How and Why We Added Themes to the Rubrik SaaS Platform

Assume breach and recover faster Protect your data from the inevitable Recover safely, quickly, and precisely Assume breach and recover faster Register Now As a part of our continuous efforts towards modernizing the Rubrik SaaS platform, we recently added multi-theme support. We offer Bright and Dark themes, promoting consistency between different applications. Themes specify the colors of components, the darkness of the different surfaces, the level of shadow, and more.

TrustRadius Names Rubrik as Top Rated Provider in Data Security Categories

Over 4,000 customers around the world trust Rubrik to protect, automate, and govern their applications at massive scale in one seamless fabric across data centers and clouds. It goes without saying that we truly value these partnerships and relentlessly strive to bring our customers peace of mind. With over 60,000 high-quality, in-depth user reviews analyzed from the last 12 months, we are honored to be awarded TrustRadius’ Top Rated 2022 award for nine categories.

Rubrik Cloud Native Protection is now available on Google Cloud Marketplace

Protecting and managing Google Cloud environments just got easier. Rubrik Cloud Native Protection is now available on Google Cloud Marketplace. Since 2019, Rubrik has been a trusted Google Cloud partner helping organizations enable data protection, automation, granular search, and world-class Zero Trust data security in the cloud. Rubrik helps organizations become cyber resilient through data immutability, logical air gapping, end-to-end encryption, and granular role-based access control.

How Phishing works

Social engineering is the art of manipulating people so that they give up confidential information or perform an action you ask them to do. Social engineers are usually trying to trick victims into giving them their credentials, bank information or access to computers to secretly install malicious software. Find out how phishing actually works and what you can do to reduce the risk.

Sponsored Post

The Beginning of Ransomware

Ransomware's ascent from a minor crime to a multi-billion-dollar industry shows the seriousness of the danger to corporations. But even though Ransomware has been making the news regularly for the past five years, it is not new to hold user data or systems hostage and then demand a payment to get them back. This article will look at the evolution of ransomware, from its first known attack in 1989 to the vicious threat it has become in the present.

Examples of Ransomware: 7 Cyber Security Trends To Fight Back

Cybersecurity threats continue to increase in sophistication and frequency. As a CIO, it is important to be aware of the latest trends and how to best protect your organization from these threats. Here are seven cybersecurity trends and ransomware attack examples that you should make sure to keep top of mind in 2022.

The State of Security: Malware in 2022

Among the many challenges businesses contend with in the global marketplace today, the 11th Allianz Risk Barometer 2022 ranks cybersecurity threats as the most important business risk. This proves beyond any doubt that enterprises are experiencing increasing threats and full-on attacks to their information technology systems.

Remember the 3 Rs of Ransomware Response: React. Reach out. Recover.

Ransomware is a (sad) fact of corporate life. 61% of businesses were impacted by cyber criminals in 2020, peaking at more than 900 attacks per organisation in 2021. Remote working is only making organisations more vulnerable. A recent study also found that the average attack costing its victims $5.3m. It’s no wonder ransomware is near the top of every CIO’s worry-list. In our last blog, we looked at how best to plan for tomorrow.