Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cross Account Replication of AWS RDS with Rubrik Security Cloud

The Relational Database Service (RDS) service offered by AWS is one of the most popular databases today. A lot of critical, confidential data resides inside of RDS. Hence it becomes imperative to protect this data from various threats and ensure that the data is secure. Our approach to protecting the data inside RDS is based on two aspects: Rubrik already supports a modern approach to safeguarding RDS data from an operational perspective and also maintains a clean, secure copy in a different region.

End to End Trust Building in Sharing Economy- How KYC is crucial

The sharing economy is a comparatively recent economic idea, yet it is fast increasing. It’s predicted to reach $335 billion by 2025. eBay was the first widely known sharing economy platform with online P2P buying and selling. After more than two decades of eBay, the sharing economy offers other solutions also, such as ride-sharing, crowdfunding, apartment sharing, and many others.

How Cyber Security Helps Identify Internet Frauds and Crimes

We all know that cybersecurity is an application of technologies that protect systems, networking programs, devices, and data from cyber-attacks. There are many cases of fraud reported every year. People who are using different networks want to keep themselves safe from online crime. In order to achieve this security, there is no need to heavily invest and hire computer experts; you can achieve it through cybersecurity.

1Password Developer Fireside Chat: Demystifying Atomics

Join 1Password senior developer, Nathan West, as he demystifies atomics – the primitive rules for safely interacting with shared memory from multiple threads. Nathan shows that, while complex, atomic code really is possible to understand. He discusses the C11 memory model, atomic and nonatomic operations, and memory orderings. Nathan also provides insight and clarification on the often-confusing concept of each thread having an independent view of the memory.

The Attacker's Toolkit: Ransomware-As-A-Service

Security threats evolve just as fast as the technologies used to stop them. New and modified attack strategies are constantly in the works. To make matters worse, the attack surface within corporate networks is expanding. The push to work from home increased vulnerable points of entry by introducing multitudes of new endpoint devices. The move to cloud-based services and infrastructure has further resulted in a broader and more challenging landscape to defend.

Analysis of Clop's Attack on South Staffordshire Water - UK

On August 15, the Clop ransomware group announced on their leak website the breach of South Staffordshire Water, a privately owned UK water supply company. This attack is yet another example of ransomware gangs targeting critical infrastructure expecting to receive a big payout, which is reminiscent of hundreds of previous incidents, including the well-known Colonial Pipeline and JBS attacks.