Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Predictions 2022: Work-from-anywhere Marks the Beginning of the End of On-premises Security

A decade ago, many were reluctant to move to the cloud. Many felt like they would have to relinquish controls they had within their perimeters. That sentiment has since reversed, where organizations have become more comfortable with cloud technology. The newest concern is about corporate data leaving the cloud, especially as employees expect to work from anywhere. Software-as-a-service (SaaS) applications have enabled people to stay productive from anywhere, but have also amplified security gaps.

Deploy a File Scanner for Sensitive Data in 40 Lines of Code

In this tutorial, we will create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall’s data loss prevention APIs and the Flask framework. The service ingests a local file, scans it for sensitive data with Nightfall, and displays the results in a simple table UI. We’ll deploy the server on Render (a PaaS Heroku alternative) so that you can serve your application publicly in production instead of running it off your local machine.

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

In this tutorial, we will create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall’s data loss prevention (DLP) APIs and the Flask framework. The service ingests a local file, scans it for sensitive data with Nightfall, and displays the results in a simple table UI. We’ll deploy the server on Render (a PaaS Heroku alternative) so that you can serve your application publicly in production instead of running it off your local machine.

Why Cyberattacks Increase During the Holiday Seasons

Cybercrime is a relevant threat any time of year, but especially during the holidays. The FBI recently issued a warning about rising ransomware attacks on holidays and weekends, a trend that is far from new but growing. As cybercrime continues to rise, holiday cybersecurity needs to improve. Many of the largest cyberattacks, including the Colonial Pipeline attack, have happened over various holidays. Smaller attacks tend to increase around these times of the year, too. Here are six reasons why.

3 times bots have impacted major world events

From stealing sneakers to pinching PlayStations, bots are increasingly earning a reputation for being nefarious and disruptive – none more so than bots deployed by state actors to wield significant geopolitical influence. The Arab Spring, Brexit, and recent US presidential elections have all been victim to carefully orchestrated bot attacks from myriad geopolitical actors.

Efficient and Reliable Protection and Recovery of Nutanix AHV

You run many of your business-critical applications on Nutanix AHV. Protecting your data from cyberattacks and being able to quickly restore your applications, so your business can continue as usual. This is why, at Rubrik, we continue to innovate and expand protection for virtual environments, and we are humbled and proud to be a trusted partner when it comes to protecting businesses.

Rubrik Enhanced Performance, Usability, and Scale for Microsoft SQL and Oracle Database

Microsoft SQL Server and Oracle Database play a critical role in almost every IT environment. That’s why from the beginning, Rubrik has focused on delivering a single platform that converges data protection and data security to ensure you can rapidly and reliably recover when disaster strikes. Our initial release automated the backup of databases with a single SLA policy engine that enabled customers to automatically protect their Microsoft SQL Server and Oracle databases as they were created.

Protect SAP HANA on IBM Power Systems with Rubrik Zero Trust Data Security

SAP HANA is often a database of choice for large enterprises looking to drive more significant insights and quick decision-making through real-time or advanced analytics. As a result, SAP HANA has become key to driving day-to-day operations for many organizations and must be protected to guarantee maximum availability. However, managing this protection is no easy feat.