Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Small Business Cyberattack Analysis: Most-Targeted SMB Sectors and Key Prevention Tips

Small and medium-sized businesses (SMBs) are more frequent targets of cybercrime than larger companies, industry research shows, and the trend is putting enormous financial pressure on small businesses. Some SMBs feel this pressure more strongly than others: CrowdStrike’s data shows sectors including not-for-profit and transportation are more frequently targeted with high- and critical-severity attacks than other industries.

How Proactive Investments in Security Operations Improve Breach Readiness and Response Capabilities

Security teams need to continually bolster their cybersecurity controls and expertise to keep up with the evolving threat landscape. Successful readiness and response to a cybersecurity breach requires the right mix of people, processes and technology. Yet challenges with staffing, technical issues, and budget hamper threat detection and response for too many organizations, creating gaps that threat actors are eager to exploit.

Using Python libraries for secure network communication

Python is a popular and powerful programming language that is often used for building web applications, data analysis, and automation. One of the key challenges in such projects is ensuring the security of network communication, which can be vulnerable to various threats such as man-in-the-middle attacks and eavesdropping. Fortunately, Python offers a range of libraries for encrypting and securing network communication.

Tips to Clean Up Your Digital Footprint

Your digital footprint could make or break critical aspects of your life from getting into college to landing a new job. It’s important to clean up your digital footprint so that it doesn’t negatively impact you. You can clean up your digital footprint by deleting any accounts you don’t use anymore, not sharing personal information on social media and by using a password manager. Read on to learn more about digital footprints and what you can do to keep yours clean.

Open source software: A pillar of modern software development

Open source software provides companies with a competitive edge but when used incorrectly, it can lead to risks in the software supply chain. Today’s modern software applications simply would not exist, or be as powerful, without the use of open source software (OSS). Developers design open source software with source code that is accessible for anyone to use, modify, and learn from, and they release the code with specific licensing rights.

DoD + DevSecOps: A path toward speed and agility

As the US Department of Defense’s (DoD’s) Software Modernization Strategy is put into place, agility, cloud adoption, and the software-factory methodology are top of mind. But according to a new study from the Hudson Institute, the DoD’s current approach to software and software updates isn’t fast enough to keep pace with modern warfare.

Rubrik Recognized as a 2023 Customers' Choice for Enterprise Backup and Recovery Software Solutions on Gartner Peer Insights

Rubrik is on a mission to secure the world’s data. And our customers are at the very heart of that mission. Research from Rubrik Zero Labs’ State of Data Security report found 98% of global IT and cybersecurity leaders dealt with a cyberattack in the last year, exposing just how critical it is for businesses to have a solid data security strategy in place and a platform they can trust to protect against these ever-growing cyber threats.

How MSSPs can consolidate security tools, reduce costs, and increase revenue.

The Managed Security Services Provider (MSSP) market is poised for exponential growth. Researchers estimate that the global managed security services market will generate revenue of approximately $53.2 billion by the end of 2031, a 264% growth rate for 2021 with a 14.2% compound annual growth rate (CAGR).

Detecting Malicious Packages and How They Obfuscate Their Malicious Code

Wow! We made it to the last post in our Malicious Packages series. While parting is such sweet sorrow, we hope blogs one, two, and three provide insights into the havoc malicious packages cause throughout your DevOps and DevSecOps pipelines. In the prior posts: Now let’s get to know attackers’ other, more discreet interests when creating a malicious package: hiding malicious code, and finally showing how malicious packages can be detected and prevented.