Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Deploy a File Scanner for Sensitive Data in 40 Lines of Code

In this tutorial, we will create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall’s data loss prevention APIs and the Flask framework. The service ingests a local file, scans it for sensitive data with Nightfall, and displays the results in a simple table UI. We’ll deploy the server on Render (a PaaS Heroku alternative) so that you can serve your application publicly in production instead of running it off your local machine.

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

In this tutorial, we will create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall’s data loss prevention (DLP) APIs and the Flask framework. The service ingests a local file, scans it for sensitive data with Nightfall, and displays the results in a simple table UI. We’ll deploy the server on Render (a PaaS Heroku alternative) so that you can serve your application publicly in production instead of running it off your local machine.

Elastic Security 7.16: Accelerate SecOps with the most powerful Elastic Security yet

In Elastic Security 7.16, multiple new out-of-the-box data integrations for Elastic Agent streamline data ingestion and normalization, powering security operations. The release also introduces full production support for several existing data integrations. Version 7.16 introduces an expanded set of malicious behavior protections, addressing methods related to initial access, privilege escalation, and defense evasion.

Why Cyberattacks Increase During the Holiday Seasons

Cybercrime is a relevant threat any time of year, but especially during the holidays. The FBI recently issued a warning about rising ransomware attacks on holidays and weekends, a trend that is far from new but growing. As cybercrime continues to rise, holiday cybersecurity needs to improve. Many of the largest cyberattacks, including the Colonial Pipeline attack, have happened over various holidays. Smaller attacks tend to increase around these times of the year, too. Here are six reasons why.

3 times bots have impacted major world events

From stealing sneakers to pinching PlayStations, bots are increasingly earning a reputation for being nefarious and disruptive – none more so than bots deployed by state actors to wield significant geopolitical influence. The Arab Spring, Brexit, and recent US presidential elections have all been victim to carefully orchestrated bot attacks from myriad geopolitical actors.

Efficient and Reliable Protection and Recovery of Nutanix AHV

You run many of your business-critical applications on Nutanix AHV. Protecting your data from cyberattacks and being able to quickly restore your applications, so your business can continue as usual. This is why, at Rubrik, we continue to innovate and expand protection for virtual environments, and we are humbled and proud to be a trusted partner when it comes to protecting businesses.

Rubrik Enhanced Performance, Usability, and Scale for Microsoft SQL and Oracle Database

Microsoft SQL Server and Oracle Database play a critical role in almost every IT environment. That’s why from the beginning, Rubrik has focused on delivering a single platform that converges data protection and data security to ensure you can rapidly and reliably recover when disaster strikes. Our initial release automated the backup of databases with a single SLA policy engine that enabled customers to automatically protect their Microsoft SQL Server and Oracle databases as they were created.

Protect SAP HANA on IBM Power Systems with Rubrik Zero Trust Data Security

SAP HANA is often a database of choice for large enterprises looking to drive more significant insights and quick decision-making through real-time or advanced analytics. As a result, SAP HANA has become key to driving day-to-day operations for many organizations and must be protected to guarantee maximum availability. However, managing this protection is no easy feat.