Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

China's Cyber Strategy Exposed

Chinese cyber operations aren’t random hacks; they are part of a broader geopolitical competition for information, economic advantage, and strategic influence. Every operation ties back to China’s long-term national objectives. Mei Danowski, Co-Founder of Natto Thoughts Online Publication, explains how these attacks serve national objectives and why cybersecurity defenders must adapt.

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance

Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.

Why CTI Must Recommend, Not Just Report

In traditional intel roles, analysts avoid making direct recommendations. But Scott Scher explains why that doesn’t work in the business world. CTI teams can’t just present options, they need to say what should happen next. Scott breaks down why effective CTI must go beyond context and offer clear, actionable guidance for defenders. Hidden Truths: Traditional intel avoids giving direct recommendations Business leaders and defenders want clear next steps CTI teams must say.

CTI as Cover: The Justification Behind Every Security Decision

CTI isn’t just about detecting threats, it’s about helping defenders justify the decisions they make. Scott Scher explains why cyber threat intelligence should be seen as cover, not an excuse. It should be seen as a way to prioritize and explain security actions with confidence. Scott lays out how CTI can give defenders clarity, accountability, and the ability to say.

When AI Agents Go Awry

When your AI agents go awry, rewind those changes easily with Agent Rewind from Rubrik. As AI agents gain autonomy and optimize for outcomes, unintended errors can lead to business downtime. Agent Rewind will enable organizations to undo mistakes made by agentic AI by providing visibility into agents' actions and enabling enterprises to rewind those changes to applications and data. We’ve integrated Predibase's advanced AI infrastructure with Rubrik's recovery capabilities to enable enterprises to embrace agentic AI confidently.

The "So What?" Problem in Threat Intelligence

Defense teams and many others across the organization don’t always understand what intelligence is or how to use it. Scott Scher explains why that second part, how to use it, is what CTI teams often miss. Scott shares why intelligence must go beyond reports and clearly communicate what matters and what to do next. Key Points: Most teams don’t know how to apply raw intelligence CTI must embed the “so what” and “what now” Reports alone are not enough Actionability is what makes intel valuable.

Breaking the Intelligence-Defense Divide with Scott Scher

Cyber threat intelligence is often misunderstood, seen as a niche reporting function instead of the connective tissue that links defenders, leaders, and strategy. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his off‑grid years shaped his view on resilience, why CTI should be seen as “counter‑threat intelligence,” and how intelligence defenders, and policy teams can work as one to turn raw data into actionable security decisions.

The New Guy (a.k.a. Agentic AI)

AI agents have already caused unintended record updates, broken workflows, and pushed flawed logic into production systems. These misfires often go unnoticed until forecasts stall, pipelines break, or sensitive data is affected. These aren’t hallucinations. They’re executed actions with real consequences. At Rubrik, we’ve spent years helping enterprises recover from ransomware, insider threats, and operational errors. The pattern is always the same: Damage happens fast. The root cause is murky. And visibility is fragmented.

Rubrik Preemptive Recovery: Explained!

In the fight against ransomware, every second counts—if you're manually responding only after an attack, you could already be too late. In this video, we'll explore Rubrik's Preemptive Recovery Engine, a groundbreaking capability designed to proactively detect threats and speed up your recovery response. Unlike traditional, reactive solutions, Rubrik automatically identifies clean snapshots, pinpoints the optimal recovery points, and prepares your critical data ahead of threats—dramatically shrinking your recovery window and minimizing disruption.

The Geopolitical Security Playbook: When Nations Clash in Cyberspace

In this episode of Data Security Decoded, host Caleb Tolin sits down with Dustin Droullard, a cyber threat intelligence expert and former Army intelligence analyst, to discuss how global conflict is increasingly playing out in cyberspace, from digital espionage to civilian-targeted cyber operations. This episode highlights why organizations must rethink their cyber risk strategies in light of modern geopolitical threats and growing digital exposure.