Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks on Hospitals Are Attacks on Communities: Why Ransomware Is a Patient Safety Crisis

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with John Riggi, National Advisor for Cybersecurity and Risk at the American Hospital Association. Drawing on nearly 30 years at the FBI and his current work advising more than 5,000 hospitals, Riggi explains why ransomware attacks on healthcare should be treated as threat-to-life events. He breaks down the real-world consequences of cyberattacks, from ambulance diversion to delayed cancer care, and outlines what leaders must do now to prepare for outages that last weeks, not hours.

Leaked Credentials: The Hidden Supply Chain Powering Modern Ransomware Attacks

Ransomware incidents are often perceived as sudden, destructive events triggered by malicious payloads. In reality, many modern ransomware attacks begin much earlier and in a far less visible way: with compromised credentials and pre-existing access sold in underground markets. Threat intelligence collected from access broker activity and credential exposure sources indicates that ransomware operators increasingly rely on purchased access rather than direct exploitation.

Key Lessons from the Major Ransomware Attacks in Recent Months

The biggest ransomware attacks of 2025 have shown that this threat remains critical for organizations across all sectors. Incidents such as the Change Healthcare attack, which compromised the data of nearly 190 million individuals, and the attack on Jaguar Land Rover, which forced production lines to halt and caused losses amounting to hundreds of millions of dollars, show that a single incident can impact both operational continuity and information confidentiality.

Amit Malik gives you an inside look at new attack methods being used by adversaries

Attackers are using AI and LLMs in unique ways to increase their capabilities and minimize their footprint; so how can defenders respond? Don’t miss this episode of Data Security Decoded with Amit Malik, a Staff Security Researcher at Rubrik Zero Labs, who gives you an inside look at new attack methods being used by adversaries. Get Data Security Decoded wherever you listen to your podcasts, or subscribe to our channel!

1,500% Surge in New Malware: Why MSPs Must Act Now

The latest findings from WatchGuard Technologies reveal a stark reality for managed service providers: cyber threats are not only increasing—they’re evolving faster than traditional defenses can keep up. In its newest Internet Security Report, WatchGuard identified a 1,548% spike in new, unique malware from Q3 to Q4 2025. Nearly one in four threats bypassed signature-based detection, highlighting a critical gap in reactive security models still used across many customer environments.

Protecting Azure DevOps with Rubrik

Your code is one of your organization’s most critical assets, and protecting it should be as resilient as the applications it builds. In this video, we walk through how Rubrik delivers enterprise-grade protection for enterprise-critical code by securing Azure DevOps repositories against accidental deletion, malicious activity, and ransomware threats.

Ransomware in Financial Services: Traditional Backup Isn't Enough

Many financial services IT leaders believe they’re protected against ransomware because they have backups. According to Sophos’ State of Ransomware in Financial Services 2025, 64% of financial services organizations were hit by ransomware in the past year. Of those with backups, a significant percentage discovered their backup infrastructure had been compromised too. Modern ransomware operators don’t just encrypt production data.

The Real Risks of Agentic AI in the Enterprise with Camille Stewart-Gloster

In this episode of Data Security Decoded, host Caleb Tolin is joined by Camille Stewart-Gloster, CEO of CAS Strategies and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization. Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations, and why conditional access and governance must be foundational, not optional.