Cybersecurity in healthcare isn't just about firewalls and software — it's about empowering every person in the organization. From nurses to administrators, everyone needs to feel safe reporting threats and be trained continuously, not just once a year. It's time to build a human firewall — a culture where cybersecurity is everyone's responsibility. Errol Weiss breaks down how role-specific training and psychological safety can make or break your cyber defense.
A cyber breach shouldn't bring critical patient care to a halt. That’s the idea behind the Minimum Viable Hospital, a model that ensures essential functions continue even under attack. Errol Weiss shares how leading healthcare systems are planning for resilience, and why smaller hospitals may struggle to keep up. He highlights how the standard response to healthcare cyberattacks overlooks the complex reality of delivering medical care. It’s time to recognize that cybersecurity isn’t just about systems, it’s about people.
The rules have changed. With cloud sprawl, BYOD, and evolving threats, your systems need more than defense, they need resilience. Learn why recovery matters just as much as prevention in today’s cybersecurity playbook.
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.
Everyone's panicking about AI-powered cyber attacks, but here's what's ACTUALLY happening... Perfect grammar in phishing emails (bye-bye typos!) AI helping write basic malware code NOT some sci-fi hacking revolution The funniest part? Researchers found hackers literally leaving AI tool COMMENTS in their malware code It's like leaving a sticky note that says "ChatGPT helped me write this virus".
Plot twist: The biggest cyber threat isn't coming from hackers breaking in... It's coming from vendors you INVITED in! Most companies only discover their third-party risks during ransomware simulations - when it's too late to fix them. Here's the uncomfortable reality: You don't know who has access to your systems You don't know what they can actually touch You're one vendor breach away from disaster.
You'd think hackers use the latest zero-day exploits, right? WRONG! PwC's threat intelligence reveals hackers are actually exploiting OLD vulnerabilities that companies just... forgot to patch While cybersecurity teams chase shiny new threats, criminals are walking through the front door with keys we left lying around. The scariest part? Even criminal groups (not just nation-states) are making this their primary attack method.
In this episode of Data Security Decoded, Allison Wikoff, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.
RPM Global, a leading ASX-listed mining advisory and software company, turns to Rubrik for operational resilience. Challenged by a phishing attack on its core business unit in the past, RPM Global now leverages Rubrik’s comprehensive product suite, including M365 Protection, Rubrik Cloud Vault, and Edge, to safeguard its most valuable asset - customer data.