Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Product Quality at Rubrik - Part 2

In our previous blog, we discussed the importance of product quality, different types of testing we rely on at Rubrik, and how automated testing plays a pivotal role in ensuring quality of our products. Relying heavily on Unit, Component and Integration testing is important. But there will be code paths which we may not be able to cover using these types of tests. In the picture below, we can see a high-level view of our solution.

Cost-Effective Disaster Recovery for Wasabi and Veeam

In the IT industry, downtime is typically estimated at approximately $5,600 per minute, posing a significant threat to revenue, customer trust, and compliance. For SMBs, safeguarding data and ensuring business continuity are paramount for survival and competitiveness. A robust disaster recovery (DR) solution not only protects against threats like cyberattacks and hardware failures but also minimizes downtime, demonstrating reliability to customers and partners.

Creating DataTrails for Supply Chain Artifacts

In a world where software is produced, distributed, and re-distributed, how do you ensure the software you consume is authentic and safe for your environment? How do you know the software you deployed yesterday is safe today? Most software exploits are discovered after the software has been deployed, which raises the question: It’s not just about getting software updates, as the majority of exploits are distributed as updates. Staying updated isn’t the most secure.

What Can Someone Do With Your Social Security Number?

If someone steals your Social Security number, they can use it to open bank accounts under your name, steal your benefits, file your tax return and commit other types of fraud. Your Social Security number is tied to your identity in the U.S. Without it, you are unable to identify yourself to receive employment and benefits. A threat actor can use your Social Security number for malicious purposes such as stealing your benefits or committing crimes under your name.

Container security essentials

As cloud-native applications continue to proliferate, containers are becoming the preferred option to package and deploy these applications because of the agility and scalability they offer. In fact, Gartner predicts that 75% of global organizations are running containerized applications in production. The popularity of containers has also attracted hackers looking for new ways to exploit applications.

Verizon Employee Data Compromised

Verizon is a top-performing communications organization with clients and influence worldwide. They offer various electronic services, including physical technology, Internet services, entertainment programs, communications plans, etc. They enjoy a user base of nearly 145 million people in the US, making them the largest telecoms operator in the states. Verizon recently announced a breach in mid-September 2023; however, the event was not from an external threat actor—it came from an employee.

Critical Windows Event IDs to Monitor

Like most organizations, your company likely invested in various Microsoft products. The Microsoft ecosystem provides businesses with nearly every kind of technology necessary, from workstation operating systems to Azure to Windows 365 that includes cloud-native versions of their traditional Office tools and the communication platform Teams. However, attackers are just as invested in the Microsoft ecosystem.

Guest Blog: Bolstering Medical Cybersecurity - How ZTNA Platforms Stand as Guardians

A guest blog, written by Jaye Tilson, Field CTO at HPE Aruba. The healthcare industry, the very lifeline entrusted with safeguarding our most sensitive data, is under relentless attack. Cybercriminals see medical records, financial information, and even critical patient monitoring data as their golden goose, with breaches inflicting unimaginable harm. In this ever-evolving threat landscape, healthcare companies must prioritize building robust cybersecurity strategies.

How a Managed Detection and Response Provider's Global Footprint Helps Defend Against Cyber Threats

Cyber threats can originate from anywhere around the globe. For services such as managed detection and response (MDR) to effectively defend against them requires a managed security service provider (MSSP) that likewise has a global footprint. The top 10 countries from which distributed denial-of-service attacks (DDoS) originate include China, Brazil, India, Indonesia, Russia, and Germany, according to data collected by the cloud services company Cloudflare. At the same time, the U.S.