Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Impact of Cyber Events on Patient Care

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. We're excited to kick off a series of special episodes featuring highlights from the recent Rubrik Zero Labs Virtual Summit. This series offers a unique look into the critical conversations happening around data security.

What You Need to Know About the ISOO CUI Registry

We’ve written a lot about various security frameworks, from CMMC to ISO 27001, and throughout all of them, one of the core elements is the need to protect CUI. Information that is controlled at a very high – SECRET, Classified, or other – level is tightly bound by specific rules and can only be handled by select individuals. Completely base, public information is freely available and completely uncontrolled. But there’s a lot of information somewhere in the middle.

The Role of Network Forensics in Identifying Threats

The outlook of cyber threats in this modern cyber warfare theater has changed a great deal. Annually, 60% businesses drop victims to data breaches and cyber-attacks. Security teams intrinsically find themselves in a scenario whereby they lack visibility and control of the network traffic and are incidentally unable to detect and respond in real-time. To this regard, modern cybersecurity strategies now incorporate network forensics into their arsenal of defenses.

Threat Hunting for macOS - Webinar

MacOS environments are increasingly becoming targets for sophisticated cyber attacks. This webinar delves into advanced threat hunting techniques within macOS, focusing on the utilization of MUL (macOS Unified Logging) events and comprehensive system telemetry. We look at macOS data sources to uncover hidden threats and enhance detection capabilities.

Designing Secure and Private Software by Default with Chris Romeo from devici

The current state of application security often leaves us reacting to data breaches and unauthorized disclosures well after they have occurred. How do we change this reactive reality? In this webinar, we’ll discuss this and other questions: By adopting these principles, development teams can shift from a reactive to a proactive stance, ensuring their software products are robust, trustworthy, and aligned with the highest security standards.

ASPM and Modern Application Security

Gartner’s 2024 Hype Cycle for Application Security is making the rounds, and Application Security Posture Management (ASPM) continues to climb up and around the famous curve, from the Peak of Inflated Expectations in 2023 to this year’s slide towards the Trough of Disillusionment. That’s pretty fast movement for a technology that we haven’t yet succeeded in clearly defining!

BlackByte Ransomware Exploits VMware ESXi Vulnerability: A Critical Update

In a troubling development for cybersecurity, the BlackByte ransomware group has shifted tactics by exploiting a newly discovered authentication bypass vulnerability in VMware ESXi, tracked as CVE-2024-37085. This vulnerability has allowed attackers to compromise critical infrastructure within enterprise networks, highlighting a significant shift in the threat landscape.

Meduza Stealer: Detailed Analysis of its Features, Capabilities, and Recent Updates on Active C2

The Meduza Stealer, a malware designed for comprehensive data theft, first appeared on dark web forums on June 12, 2023. It was introduced by a mysterious actor known only as 'Meduza,' with prices ranging from $199 to $1199. Since its emergence, it has gained attention across cybercriminal communities for its potent capabilities.