Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Introducing Rubrik SaaS Support for Microsoft Azure SQL

Since January 2020, Microsoft Azure SQL DB has grown nearly 3x in popularity. This rapid growth comes as no surprise as Platform-as-a-service (PaaS) offerings have many benefits in the migration strategy from traditional SQL Server database workloads. The Microsoft PaaS offering, Azure SQL Database, takes care of mundane tasks once performed by Infrastructure Engineers such as patching operating systems and applying SQL Server updates or critical security patches.

Cybersecurity Best Practices for the Holiday Season

’Tis the season to be jolly. But it’s also the season of distraction, which makes the holidays the perfect time for hackers to focus on your business. Here are a few cybersecurity best practices that will keep your business protected during the holidays. For many organizations, this is a peak season. For others, things slow.

Key trends from 2021 that redefined IAM

With 2022 around the corner, many want to hit the ground running and make the new year different from the last. If you’ve also been preparing for a productive year and scaling your organization up, this blog will bring you up to speed on the major security trends of 2021 you should know about. With ADManager Plus, you can easily adapt to these new trends and be ready to take on any IAM challenge in 2022. For now, here are the major IAM trends of 2021.

5 holiday Cybersecurity tips retailers need this year

Retailers around the world are preparing for a chaotic holiday season. Supply chain disruptions are causing issues, and the ongoing COVID-19 pandemic is something retailers need to keep in mind, especially when operating a brick-and-mortar location. Another pressing issue that retailers of all sizes need to address before the peak of the holiday season is the risk of facing a cybersecurity crisis.

What does the Secret Key do for you and for us?

A unique feature of 1Password’s security is the Secret Key, but its value is often misunderstood by users and security experts alike. Instead of thinking in terms of “is it like a second factor” or “is it like a key file” it’s best to explain it in terms of what it actually does: It protects you if we were to be breached.

MDR and MSS Are No Longer 'Nice to Have' For Cyber Resilience, They're Mandatory

In today’s evolving threat landscape, the decision of whether to bring in external talent expertise is no longer optional. During the 2021 Gartner Security and Risk Management Summit, we heard other facts and figures that aligned with the needs of our customers and of the market. At the summit, Gartner analysts noted that organizations must have partnerships with MSS/MDR providers and security consulting firms if security is to enable corporate business objectives.

How to To Harden MS SQL Server 2008: 11 Ways

As Redmond's flagship RDBMS solution, SQL Server provides the underlying data platform for a broad range of Microsoft enterprise solutions— from Sharepoint to BizTalk Server. This, of course, makes bolstering SQL Server security a critical necessity for protecting MS-centric infrastructures against attackers. To this end, the following are 11 ways to harden MS SQL Server 2008 security.

Removing the Fantasy of Cybersecurity Metrics with Tripwire Connect

One of the most daunting problems in cybersecurity has always been security metrics. In business, practically nothing matters in the absence of the ability to measure actionable results. Profit and loss are the drivers of all businesses. Even non-profit based businesses use metrics to plot their mission and meet their goals.

Tripwire Industrial Edge - The New Method of Visibility for Industrial Networks

When was the last time you thought about all of the devices running on your network? Think of your home network and how deceptively simple it appears. A full inventory of that network would probably surprise you, as it would show all of the devices that you may have forgotten about as well as a few of the neighbor’s devices that are piggy-backing off of your Wi-Fi. This visibility is often shocking to many people.

6 Ways Biotechs Can Use AI, Automation to Maximize Data at Scale

For years, biotechs have been hampered by the administrative burden of seemingly endless amounts of diverse, siloed data, slow data ingestion, and security threats coming from internal and external sources. And yet, the life sciences industry continues to see double-digit growth. It’s now worth $285 billion a year, with no signs of slowing down.