Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik + Microsoft Sentinel: Taking Incident Response to the Next Level with AI

Security teams use tools like Microsoft Sentinel to aggregate their security events, alert on threat detection, and most importantly, orchestrate threat responses through a variety of automated playbooks. By providing both Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) functionality, Sentinel enables teams to respond to threats quickly and efficiently.

NIST Compliance for Enhanced Security

In today’s ever-evolving digital landscape, organizations operating in regulated industries face the challenge of meeting stringent regulatory requirements to ensure the security and privacy of their systems and data. NIST compliance, guided by key NIST publications, plays a vital role in helping organizations navigate these complex regulatory landscapes effectively.

The Value of SOC2 Compliance

Say you’re a medium-sized financial organization. Your clients trust you to not only provide excellent financial services, but to keep their money, financial data, and personal data safe. Unfortunately, the amount of money you store and move attracts a wide array of cybercriminals. Staying safe can become complicated, but no bank, trust, or credit union wants to gain headlines and lose customers over a breach. That’s where SOC2 (System and Organization Controls), can make a major difference.

A Red Team's Perspective: How to Scope a Penetration Test

Penetration testing is a crucial part of a comprehensive cybersecurity plan. By simulating a real-world attack, a penetration test can help identify vulnerabilities and weaknesses across systems, networks, and applications before a malicious actor can exploit them. To get off on the right foot with a penetration test and get an accurate timeline and budget for the test, it’s important to have a proper scope. Learn how to scope a penetration test from the perspective of the Sedara Red Team.

Tanium Patch: Zero Touch + Self Service - Tanium Tech Talks #64

"Reliable, verifiable, zero-touch patching." On today's Tanium Tech Talk learn about Zero Touch patching and Self Service. The everyday block and tackle of IT operations is patching. The security teams needs it to cover the holes. The risk team needs to satisfy compliance. And the ops team is stuck doing it. That has been the story for years… until Tanium. Today we're going to see how Tanium has turned patching into quite literally a "set it and forget it" activity where everybody wins, even the end user. It truly is a game changer.

What is the Mitre ATT&CK Framework?

In cybersecurity, being well-versed in the wide range of resources available for protecting and enhancing your digital environment is crucial. One of the most significant and effective tools is the Mitre ATT&CK Framework. Read on for an in-depth exploration of this critical cybersecurity framework and how you can apply it to your own organization.

Rubrik Recognized as the Winner of 2023 Microsoft US and UK Partner of the Year

Rubrik has won the Business Transformation, Global Independent Software Vendor (ISV) 2023 Microsoft U.S. Partner of the Year award and has been named Microsoft U.K. ISV Partner of the Year 2023. The company was honored among a field of top Microsoft partners for demonstrating excellence in innovation and implementation of customer solutions based on Microsoft technology.

CIS Critical Security Controls 101: Everything to Know About the 18 Controls

The Center for Internet Security (CIS) defines CIS Critical Security Controls as: “A prioritized set of Safeguards to mitigate the most prevalent cyberattacks against systems and networks.” Essentially, CIS Controls are a framework of actions that organizations can take to improve their overall security posture. These controls are organized into categories and updated frequently to address emerging threats and technologies. In this article, we’ll look deeper into all 18 controls.