Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ensuring Microsoft 365 Data Security and Compliance with Veeam

As of 2023, Microsoft Office 365 is utilized by over a million companies globally, according to a recent Statista report. It has become an indispensable tool for organizations as they adapt to hybrid workforces and a global economy, leveraging its collaborative power and the need for a robust data protection strategy. At the core of Microsoft 365’s security framework lies the Shared Responsibility Model, delineating the responsibilities of Microsoft and organizations using their services.

The Need For a Shift Up Strategy, Using CRQ for Resilience, Part 2

Conducting business, no matter in which industry, is innately risky. Historically, some of the primary drivers of this business risk included natural disasters, hardware and inventory theft, legal and compliance regulations, and economic downturns. However, in the midst of the digital age, cyber threats loom as one of the most prominent forms of organizational uncertainty, housing the potential to cause trillions of dollars in damages.

Rubrik Security Cloud-Government is StateRAMP Certified

Here at Rubrik, few things excite us more than knowing that the work we do enables a smoother functioning of our governments. Government organizations have an important duty to defend our nation’s critical institutions and essential infrastructure against threat actors—while operating with limited budgets and limited resources. Rubrik has a long history of securing public sector institutions. We have relentlessly focused on developing products that ensure rapid and confident cyber recovery.

Cybersecurity in 2024: Five predictions from our co-founders

With the cybersecurity landscape constantly evolving, discussing cybersecurity trends for 2024 can feel like trying to predict the unpredictable. But amid all the uncertainty, trading ideas about the future of security can help us better understand how to prepare for the months ahead. Here, our co-founders Thomas Kinsella and Eoin Hinchy share five cybersecurity predictions for 2024, including insights on AI's role in security, the ever-changing role of the CISO, and more.

BoxyHQ 2023 Changelog: Enhancing Security with Retraced-Powered Audit Logs

BoxyHQ's audit logs are powered by Retraced which, in the true spirit of open source, is also a collaboration between us and Replicated. While this project did not have the same level of activity as SAML Jackson, it is a critical component of our offering and we are excited to share some of the highlights from 2023. Instead of doing a list by quarter, for this one we will just do a list of notable new features, fixes, and changes in chronological order starting in February 2023.

The Debut of the Industry-First API Security Posture Management Engine

Today, we’re thrilled to share that Salt has launched extended capabilities to our powerful platform, adding yet another industry-first technical advancement to our trophy case! (full announcement here.) Since its founding, Salt’s been on a mission to create a platform that can detect, prioritize and solve the most complex API security challenges and risks.

3 Things About 2023's Threat Landscape That Shapes My 2024 CIO POV

2023 was a tumultuous year that drove technology transformations at a pace unknown. The industry saw an accelerated and unrivaled pace of technology adoption, persistent yet evolving challenges and unparalleled market dynamics around the world. The following are the top three trends from last year that influenced my thinking as a CIO at the top of 2024.

What is XML-RPC? Benefits, Security Risks, and Detection Techniques

XML-RPC is a powerful and versatile protocol in the ever-evolving web development and data communication landscape. XML-RPC, which stands for Extensible Markup Language – Remote Procedure Call, provides a standardized way for software applications to communicate over the Internet. XML-RPC for PHP is affected by a remote code-injection vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the webserver context.