Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik

The Real-World Threat of Cyberattacks on Water infrastructure

Do you remember the last time you didn’t have water? Reliable water delivery is something many of us take for granted. Our local water treatment plant sits at the edge of our neighborhood, and I pass it every day on my way to take the kids to school. Not a lot seems to go on there, so it never occurred to me that I should be concerned about an attack on this critical infrastructure. What does occur to me is the possibility of a cyberattack on our water system.

Enhancing your Clean Room with Rubrik Security Cloud and Cyber Recovery

Properly architecting and designing solutions for clean room recovery is a crucial step for any organization looking to become more resilient to cyber threats. Clean rooms provide organizations with an isolated environment where data integrity and recovery processes are insulated from external threats. By providing a clean room environment, organizations can expedite security investigations and recovery timelines in the event of a cyber attack.

Rubrik Wins Microsoft Healthcare and Life Sciences Partner of the Year

Have you ever wondered what it takes to ensure that the data behind every life-saving surgery, every critical care decision, and every patient record is not only secure but also instantly recoverable in the face of cyber threats? In the world of healthcare, where every second can mean the difference between life and death, this isn't just a technical challenge - it's a mission.

Rubrik Announces Integration With Microsoft Information Protection (MIP) Sensitivity Labels

We are excited to announce that Rubrik DSPM now supports Microsoft Information Protection (MIP) sensitivity labels. This integration helps our joint customers to better track and secure files with sensitive data – both within and outside of Microsoft environments. MIP labels are used by organizations to map sensitive data within their Microsoft environment, control access to that data, and enable protection settings such as encryption.

Amazon S3 Data Protection: The Myths and the Facts

So, you’re all set up with Amazon Simple Storage Service (Amazon S3), because you’re looking for best-in-class solutions for your company’s structured and unstructured data. Smart. But there’s more to do. Here are some myths about your Amazon S3 data, the real story behind them. Phew! We’re glad you agree that your Amazon S3 data needs strong protection. Wise decision. Here’s where we can help with a faster, cheaper, better solution.

Hunt for Threats Within Backups to Minimize Data Loss and Downtime

Mike Tyson famously said, “Everybody has a plan until they get punched in the mouth.” After falling victim to a cyberattack, it is crucial for organizations to respond promptly and effectively to minimize damage, recover operations, and prevent future incidents. One of the most critical elements of responding to an incident is the recovery and restoration of affected systems so that business as usual can be restored as quickly and safely as possible.

Rubrik Expands Data Access Governance (DAG) Solution with New Identity Inventory

In a recent Fortune article, Amazon’s chief security officer, Steve Schmidt, suggests 6 questions every company's board should ask its CISOs to understand how robust their cybersecurity preparation is. One of the most challenging questions for CISOs was: “Who has access to what data? Why do they need it, and for how long?” This question is critical because cyberattacks often begin with weak, leaked, or stolen passwords.

Understanding and Mitigating Snowflake Data Risks Amid Increased Cyber Threat Activity

In today's digital landscape, data security is more crucial than ever. Recently, Snowflake, a leading cloud data platform, has observed a significant uptick in cyber threat activity targeting some of its customers' accounts. This development has prompted an in-depth investigation to understand and mitigate these risks.

Driving Strategic Excellence in Cybersecurity with Sue Bergamo, CISO and CIO, BTE Partners

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. Each episode features senior cybersecurity leaders and other luminaries with unique perspectives about the current state of data security. We explore rising trends and themes across cybersecurity and unpack what that means for organizations looking to secure their data and achieve cyber resilience.