Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.

Rubrik's FedRAMP Authorization: A New Era of Federal Cyber Recovery and Resilience

We're thrilled to share some big news; Rubrik Security Cloud - Government has officially achieved FedRAMP Moderate authorization! What does this mean for your agency and the citizens you serve? Well, it's a significant milestone that reinforces our commitment to protect your data and deliver cyber resilience in accordance with top-tier federal cybersecurity standards.

Healthcare's Biggest Cybersecurity Risk: Insider Threats! #shorts #podcast #cybersecurity

Maria Roat, Former Deputy Federal CIO emphasizes that, “If healthcare personnel aren’t trained, not just on threats, but insider risks—cybersecurity will always fall short.” Cybersecurity starts with people. Hear Maria’s take on why healthcare teams must lead the charge. Catch Maria's powerful insights on with Travis Rosiek. Discover: The impact of insider threats Why training healthcare teams is critical How cybersecurity saves lives.

Cybersecurity Leadership Transitions with Maria Roat, Former US Deputy Federal CIO

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Data Detection and Response (DDR): Stopping an Attack in its Tracks

In this episode of Into the Breach, host James Purvis dives into the cutting-edge world of Data Detection and Response (DDR) with data security expert Drew Russell. Together, they explore how DDR can halt cyberattacks in their tracks by combining autonomous asset inventory, user activity insights, and data classification for a comprehensive defense strategy.