Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sue Bergamo - Confidentiality, Integrity, and Availability - CIA Triad

“This isn't a job for the faint of heart. If people can't understand the triad that CISOs abide by—confidentiality, integrity, and availability—then it’s our job to make them understand.” Sue Bergamo Exciting news! In our latest episode of Data Security Decoded, we had the pleasure of hosting Sue Bergamo, CIO and CISO at BTE Partners.

Beyond AWS Native Backup: A Simpler Path to Data Protection

We are often asked how Rubrik Security Cloud differs from AWS Backup. It's a valid question because, at first glance, the two solutions seem similar. Both have cloud-first, API-driven architectures. Both are built specifically to ensure reliable backup and recovery for data stored across AWS. Both support a wide range of the most popular AWS workloads including EC2, EBS, S3, RDS and EKS.

Building High Availability into a Large Cloud SQL Fleet, Part 2: Optimizations and Design Choices

At Rubrik, we rely on a multi-tenant architecture to store customer metadata in a large fleet of Cloud SQL database instances. With numerous production deployments globally, each supporting multiple customer accounts, maintaining high availability, performance, and robustness across this infrastructure is critical. Managing a large fleet of Cloud SQL instances and ensuring they remain resilient and performant has been a journey filled with valuable lessons.

The Hidden Cost of Hospital Cyber Attacks: What Happens to Patients? #Healthcare #DataSecurity

What happens to patients when their local hospital has a ransomware attack? How do you even find that? You collect data on every cyberattack on a healthcare provider. Next, you look at data from Medicare and then overlay those two data sets. Simple. Listen to the latest episode of the @Data Security Decoded podcast, where @Steve Stone is joined by @Hannah Neprash, PhD, Assistant Professor at the University of Minnesota School of Public Health.

Faster Remediation with Data-Centric Security Insights

In this episode of Into the Breach, James Purvis and Mike Schmidt discuss how adopting a data-centric security approach can lead to faster remediation and better alert prioritization. With SOC teams overwhelmed by millions of alerts, they explore how DSPM (Data Security Posture Management) provides visibility, reduces noise, and focuses on protecting sensitive data. Learn how DSPM can help streamline security operations and safeguard your business-critical assets.

Relax, you've got Rubrik in your corner!

With Rubrik Security Cloud, you’ll be unstoppable against cyberattacks. You can protect your data wherever it lives: across the enterprise, in SaaS applications, and in the cloud. You’ll also be able to continuously monitor data risks, and recover data and applications quickly. We take great pride in helping IT and security teams find peace of mind. With Rubrik, your team can rest easy knowing your data is secure and resilient.

Enhancing Government Security with Continuous Threat Monitoring by Rubrik

The government sector is facing growing cybersecurity threats that require robust solutions to safeguard sensitive data and critical infrastructure. With rapidly evolving threats—from adversarial actions from politically unstable state actors to GenAI-powered social engineering and phishing campaigns—the government sector faces a pressing need to transition from reactive threat monitoring to proactive threat monitoring.

Can DSPM Really Help Backup Admins?

In this episode of Into the Breach, James Purvis is joined by Filip Verloy to discuss a rarely explored but highly impactful topic: Can DSPM help backup administrators? Together, they dive into how DSPM enhances visibility, optimizes backup strategies, reduces costs, and strengthens cyber resilience. From managing redundant data to supporting recovery efforts during ransomware attacks, this conversation highlights DSPM's potential to revolutionize traditional backup processes while addressing modern regulatory demands.

Protect Your SAP HANA Data With Air-Gapped Rubrik Solution

SAP HANA is a multi-model database that stores data in memory instead of on disk to handle high-speed transactions and real-time analytics simultaneously. Unlike traditional databases that rely heavily on disk I/O, SAP HANA's in-memory storage allows for significantly faster query execution and data processing, making it ideal for modern enterprise workloads. SAP HANA supports both OLTP (Online Transaction Processing) and OLAP (Online Analytical Processing) workloads within a single system.

Will Proposed Rules for Health Industry Actually Strengthen Cybersecurity?

If you’re a US citizen, you’re likely numb to the endless letters informing you of your information being stolen yet again. For most of us, this is an annoyance and an inconvenience. But if you’re a patient in a hospital during an attack, it would be disconcerting to know that studies indicate medical errors increase by 30% when clinical applications are offline, and there’s a “small but significant” increase in patient mortality.

The AI Shared Responsibility Model: Who's Job Is It Anyway?

In this episode of Into the Breach, James Purvis and Filip Verloy explore the AI Shared Responsibility Model, a framework introduced by Microsoft. They break down the roles and responsibilities of cloud providers, model providers, and customers in securing AI-powered environments. From understanding the unique challenges of generative AI tools like CoPilot to the importance of proactive data governance, this discussion offers practical insights into navigating AI security today and in the future.

Leverage generative AI securely with Rubrik DSPM

Don’t let poor data visibility stop you from innovating. According to Rubrik Zero Labs, 98% of organizations report significant data visibility challenges. Rubrik DSPM gives you the control you need to reduce the risk of data exfiltration and minimize the impact of. Check out our YouTube channel to find out how you can leverage generative AI securely and prevent sensitive data leakage with Rubrik DSPM.

AI Powered Data Classification: A Game Changer or Just Hype?

In this episode of Into the Breach, James Purvis, Drew Russell, and Dan Eldad dive into the exciting yet complex world of AI-powered data classification. Is it truly a game changer, or just overhyped? They explore the potential of AI to revolutionize data classification, its limitations, and where traditional methods still hold value. The discussion also covers practical use cases, cost implications, and the future of AI in data security.