Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know About the ISOO CUI Registry

We’ve written a lot about various security frameworks, from CMMC to ISO 27001, and throughout all of them, one of the core elements is the need to protect CUI. Information that is controlled at a very high – SECRET, Classified, or other – level is tightly bound by specific rules and can only be handled by select individuals. Completely base, public information is freely available and completely uncontrolled. But there’s a lot of information somewhere in the middle.

The Impact of Cyber Events on Patient Care

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. We're excited to kick off a series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security.

Curated OSS Catalogs: Enhancing Security and Efficiency in Software Development

Organizations are increasingly relying on open source software (OSS) to accelerate development and innovation. However, with great power comes great responsibility – and in this case, significant security risks. Enter the curated OSS catalog, a solution that ensures secure-by-default OSS usage. Let’s explore what a curated OSS catalog are and who stands to benefit from them.

Apple, X, and the Revolution in VPN Technology

A virtual private network is a tool used to encrypt data and mask a user's IP address. Many people use them to access content that may be banned in their country. In certain jurisdictions, X is being prohibited and has been linked to a rise in VPN use. In this article, we talk about how Apple customers have found them increasingly hard to find.

Why Your Laptop Slows Down

In today's world, a laptop is not just a luxury but an indispensable tool for both work and leisure. With technological advancements, laptops enable us to watch movies, connect with friends, listen to music, and indulge in online activities. However, when a laptop starts to slow down, users lose access to these privileges. Simple tasks that used to happen in the blink of an eye now require prolonged waiting. Maybe it's time to upgrade your RAM? Check the available RAM for your laptop.

Top tips: Notorious session sniffing attacks and tips for avoiding them

In cybersecurity, session sniffing—an attack method where attackers receive and use session data—is a recurring danger. The impacts of session sniffing are evident from numerous high-profile assaults. Let’s discuss some of these important cases that highlight the significance of strong security procedures.

How to Get Started with a Security Data Lake

Modern SecOps teams use Security Information and Event Management (SIEM) software to aggregate security logs, detect anomalies, hunt for threats, and enable rapid incident response. While SIEMs enable accurate, near real-time detection of threats, today's SIEM solutions were never designed to handle the volume of security data organizations generate daily. As daily log ingestion grows, so do the costs of data management.

The Meaning of "Brute Force Attack" and How to Detect and Prevent Them

Ever since systems started restricting access through passwords, the trial and error method has been used to crack them. But even today, brute force attacks remain a serious danger for organizations. According to the 2024 Data Breach Investigations Report by Verizon, the brute force technique accounts for 21% of all basic web application attacks.