Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Impending SIEM Wars: What Market Consolidation Means for Customers

The cybersecurity landscape is rapidly evolving, and nowhere is this more evident than in the Security Information and Event Management (SIEM) market. This period of transformation, marked by strategic mergers and high-stakes buyouts, signals not only a race for market dominance, but also the potential for profound changes in how cybersecurity solutions will operate in the future.

Multiple Critical Vulnerabilities in SolarWinds Access Rights Manager Responsibly Disclosed to Vendor

On July 17, 2024, SolarWinds published a security advisory detailing multiple critical vulnerabilities in its Access Rights Manager (ARM) software. These vulnerabilities were responsibly disclosed to SolarWinds by researchers working with Trend Micro’s Zero Day Initiative (ZDI). The vulnerabilities have CVSS scores ranging between 7.6 to 9.6. The disclosed vulnerabilities allow for remote code execution (RCE), directory traversal, information disclosure, and authentication bypass.

Unified API Protection: What It Is & How It Helps Secure API Landscape

Application Programming Interfaces (APIs) are the connecting tissue that enables the communication between applications, internal and external, and facilitate data exchange on a massive scale. In a world where information is the crown jewel of an organization, APIs are driving the delivery of digital services to customers and partners. While their usage is already exploding, the growing popularity of cloud-native technologies and microservices has only accelerated API adoption.

5 Proven Benefits of Managed Cloud Security

Managed Cloud Security is an IT model that involves outsourcing the monitoring and security operations of cloud-based infrastructure to specialised third-party providers. This enables internal IT teams to concentrate on proactive initiatives rather than being bogged down by day-to-day security management, making it a strategic choice for organisations of all sizes. This approach integrates automation to enhance data breach protection, providing real-time threat alerts and ensuring regulatory compliance.

Are Ransomware Attacks Still a Growing Threat in 2024?

Ransomware attacks continue to pose a growing threat to organizations as it has emerged as the number one threat, affecting 66% of organizations in 2023 and pulling over $1 billion from the victims. These attacks have increased in frequency and sophistication, resulting in significant financial loss, operation disruption, theft of sensitive data, and reduced productivity rates. Also, it damages the organization's reputation and results in the loss of customer trust and compliance violations.

The First Half of 2024 Results in More Than 1 Billion Data Breach Victims

New data shows that cyber attacks have resulted in double the number of data breaches in 2024 than throughout all of 2023. After a data breach, there are two common impacts– an organization with disrupted operations and customer victims. We tend to focus only on the duration it takes for an organization to regain normal operations, but the total number of victims from a data breach can take years to tally.

Rubrik Adopts CISA's Secure by Design Pledge, Reinforcing Our Commitment to Software Security

At Rubrik, we take software security extremely seriously. That's why we're proud to announce that Rubrik has adopted the Cybersecurity and Infrastructure Security Agency’s (CISA) Secure by Design Pledge. This voluntary pledge focuses on enterprise software products and services, and by taking it, we're committing to make a good-faith effort to work towards seven key goals over the next year to further enhance the security of our offerings.