Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How and Why We Added Themes to the Rubrik SaaS Platform

Assume breach and recover faster Protect your data from the inevitable Recover safely, quickly, and precisely Assume breach and recover faster Register Now As a part of our continuous efforts towards modernizing the Rubrik SaaS platform, we recently added multi-theme support. We offer Bright and Dark themes, promoting consistency between different applications. Themes specify the colors of components, the darkness of the different surfaces, the level of shadow, and more.

Your Network Data Is Gold - Uncover It Faster With Forward Networks' NQE

Your network, security, and cloud teams spend a lot of time and energy trying to extract timely insights from your enterprise network data, so your organization stays on top of risks and continually improves network performance. But what if they could quickly search your network environment like a database to better understand everything in it — and whether those objects were operating as they should?

Checksum: How does it ensure security for your vital data?

A checksum is small code of computed information that deals with data integrity and security. It is vital for huge data files (in gigabytes) being downloaded from any online site. It checks whether the downloaded file is missing any bytes and is downloaded correctly. The checksum value changes even if there is a small change in the downloaded file or data.

Difference Between Black-Box Testing & White-Box Testing

A developer goes through different development and deployment rules for creating applications. Testing is an essential step in the development cycle. When it comes to software testing, many techniques need to be used from time to time. Yet the confusion around white, grey, and black testing techniques are most common among all software testing techniques. They often appear similar, yet the differences between them are very jarring.

The New Kubernetes Gateway API and Its Use Cases

Despite being a large open-source and complex project, Kubernetes keeps on evolving at an impressive pace. Being at the center of various platforms and solutions, the biggest challenge for the Kubernetes project is to remain vendor-neutral. This is the reason the community has come up with Kubernetes Gateway API.

A CISO's Guide to Container Security: Understanding Vulnerabilities & Best Practices

Companies are introducing new apps and services to enable remote work, improve supply chains and handle disruptions caused by the pandemic. Our digital-first world thrives on speed and efficiency, and containers play a huge part in getting applications up and running quickly. Though containers offer many advantages over traditional virtualization, they also introduce significant security risks.

The future of email threat detection

As businesses continue to adopt cloud integration and remote work increases, security teams are facing more visibility challenges as well as an influx of security event data. There is more need to understand the threats than ever before, as the threat surface area increases, and tactics increase. Cyber threats are becoming more sophisticated and occurring more frequently, forcing organizations to rely on quality threat detection to protect their data, employees, and reputation.

Securing MySQL Databases with SSL/TLS.

Many databases were born over 25 years ago, back in the unadulterated times of LAN parties and IRC. SSL was just for banks and sending unencrypted database traffic accounts was just how you did things. When databases use unencrypted connections, it means someone with access to the network could watch all and inspect all database traffic.

Production MySQL SSL with Teleport Machine ID

In the first part of this blog post, we setup SSL/TLS for a MySQL database, using the built in self-signed certificates. The main problem using out of the box self-signed certificates is that clients can't verify that they're talking to the right database host, and it's not possible to verify the certificate chain. In this post we'll cover upgrading the client connection to VERIFY_IDENTITY and how to use Machine ID to continuously renew certificates.