Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unleash Agents. Not Risk.

AI agents can increase productivity, but without proper governance and centralized oversight, they can cause destruction. Now more than ever, organizations urgently need a control layer for AI agents as a part of their rollout strategy. Rubrik Agent Cloud is designed to monitor and audit agent actions, enforce real-time policies and guardrails, and undo agent mistakes. Built on the Rubrik Platform that uniquely combines data, identity, and application contexts, Rubrik Agent Cloud will deliver security, accuracy, and efficiency as they transform with AI.

Top CISO Priorities and Global Digital Trust with Morgan Adamski

Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Morgan Adamski who leads Cyber, Data, and Tech Risk at PwC and is a former US national security leader who spent 16 years tracking nation-state threats inside the US government. Coming out of a career spent inside secure facilities without windows or phones and working to address China’s prepositioning in US critical infrastructure, Morgan shares a direct view of how geopolitics is now shaping cyber risk decisions in boardrooms.

Agentic AI and Identity Sprawl: The Convergence Redefining Cyber Risk

Welcome to Data Security Decoded. In this episode, Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, for a focused look at how identity-driven threats are redefining modern security. Drawing insights from Rubrik Zero Labs’ latest report, Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats, Joe explains why identity has become the new perimeter in an era where hybrid and multi-cloud environments dominate.

Endpoint Protection Blindspot: The Rise of Ransomware in the VM Layer

Learn about the shift from physical to virtual data centers in the 2000s and the rise of ransomware attacks that take advantage of security blind spots (e.g. lack of endpoint protection) to target hypervisors and breach your data. Learn why you need to shift from prevention only to cyber resilience for stronger defenses against modern adversaries (Scattered Spider, UNC5112, and others). Rubrik can help.

Secure by Design, Secure by Default, Secure by Demand: The Signs of a Secure Software Supply Chain

Welcome to Data Security Decoded. Join host Caleb Tolin in conversation with Lauren Zabierek, Senior Vice President for the Future of Digital Security at the Institute for Security and Technology. A former CISA leader and long-time national security professional, Lauren unpacks the principles of Secure by Design, Secure by Default, and Secure by Demand and how these frameworks are reshaping the software supply chain.

Everything Runs on Software, But Most of It Isn't Secure

Our economy, healthcare, energy, and even water systems are powered by software. But here’s the hard truth is that most of that software is built insecurely. And that’s why cyberattacks keep growing in scale and impact. When code underpins everything we rely on, every flaw becomes a national risk.

Advanced Threat Hunting Demo: Brickstorm APT

Is your VMware environment secure? A sophisticated backdoor called BRICKSTORM, used by espionage actor UNC5221, could be hiding in your vCenter backups right now. Restoring from a compromised snapshot means letting the attackers right back in. But what if your backups could be your best defense? In our new 4-minute demo, we walk through the exact steps to: Proactively hunt for BRICKSTORM within your backups using YARA rules. Instantly quarantine infected snapshots to stop the threat from spreading. Identify a guaranteed 'Gold Copy' for a fast, safe, clean-room recovery.