Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Rubrik Security Cloud-Government is StateRAMP Certified

Here at Rubrik, few things excite us more than knowing that the work we do enables a smoother functioning of our governments. Government organizations have an important duty to defend our nation’s critical institutions and essential infrastructure against threat actors—while operating with limited budgets and limited resources. Rubrik has a long history of securing public sector institutions. We have relentlessly focused on developing products that ensure rapid and confident cyber recovery.

Cybersecurity in 2024: Five predictions from our co-founders

With the cybersecurity landscape constantly evolving, discussing cybersecurity trends for 2024 can feel like trying to predict the unpredictable. But amid all the uncertainty, trading ideas about the future of security can help us better understand how to prepare for the months ahead. Here, our co-founders Thomas Kinsella and Eoin Hinchy share five cybersecurity predictions for 2024, including insights on AI's role in security, the ever-changing role of the CISO, and more.

BoxyHQ 2023 Changelog: Enhancing Security with Retraced-Powered Audit Logs

BoxyHQ's audit logs are powered by Retraced which, in the true spirit of open source, is also a collaboration between us and Replicated. While this project did not have the same level of activity as SAML Jackson, it is a critical component of our offering and we are excited to share some of the highlights from 2023. Instead of doing a list by quarter, for this one we will just do a list of notable new features, fixes, and changes in chronological order starting in February 2023.

The Debut of the Industry-First API Security Posture Management Engine

Today, we’re thrilled to share that Salt has launched extended capabilities to our powerful platform, adding yet another industry-first technical advancement to our trophy case! (full announcement here.) Since its founding, Salt’s been on a mission to create a platform that can detect, prioritize and solve the most complex API security challenges and risks.

3 Things About 2023's Threat Landscape That Shapes My 2024 CIO POV

2023 was a tumultuous year that drove technology transformations at a pace unknown. The industry saw an accelerated and unrivaled pace of technology adoption, persistent yet evolving challenges and unparalleled market dynamics around the world. The following are the top three trends from last year that influenced my thinking as a CIO at the top of 2024.

What is XML-RPC? Benefits, Security Risks, and Detection Techniques

XML-RPC is a powerful and versatile protocol in the ever-evolving web development and data communication landscape. XML-RPC, which stands for Extensible Markup Language – Remote Procedure Call, provides a standardized way for software applications to communicate over the Internet. XML-RPC for PHP is affected by a remote code-injection vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the webserver context.

3 Things CISOs Can Immediately Do with Cato

Wherever you are in your SASE or SSE journey, it can be helpful knowing what other CISOs are doing once they’ve implemented these platforms. Getting started with enhanced security is a lot easier than you might think. With Cato’s security services being delivered from a scalable cloud-native architecture at multiple global points of presence, the value is immediate. In this blog post, we bring the top three things you, as a CISO, can do with Cato.

Enter The Gates: An Analysis of the DarkGate AutoIt Loader

AutoIt is a scripting language designed for automating the Windows GUI and general scripting. Over the years, it has been utilized for malicious purposes, including AutoIt-compiled malware, which dates back to as early as 2008. Malware creators have exploited the versatility of AutoIT in a variety of ways, such as using obfuscated scripts for payload decryption, utilizing legitimate tools like BaSupportVNC, and even creating worms capable of spreading through removable media and Windows shares.

Defining & Improving Your Security Posture

The security posture of any organization is the result of comprehensive security strategies, processes and practices, which enable organizations to be resilient against evolving security threats. This article describes what we mean by “security posture”, including why it matters, and what comprises it. Importantly, we’ll also understand how to assess and improve the security posture.