Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Rubrik Adopts CISA's Secure by Design Pledge, Reinforcing Our Commitment to Software Security

At Rubrik, we take software security extremely seriously. That's why we're proud to announce that Rubrik has adopted the Cybersecurity and Infrastructure Security Agency’s (CISA) Secure by Design Pledge. This voluntary pledge focuses on enterprise software products and services, and by taking it, we're committing to make a good-faith effort to work towards seven key goals over the next year to further enhance the security of our offerings.

How AI Impacts Security at SMEs

For small and medium-sized enterprises (SMEs), staying abreast of cybersecurity developments is critical — not just to growth, but to the company’s bottom line. But security evolves quickly, and it can be hard to keep up. In the midst of this fast-evolving security environment, AI has made a bold entrance. So bold, in fact, that only 10% of SMEs aren’t using AI and don’t plan to, according to a recent JumpCloud research report.

Are Ransomware Attacks Still a Growing Threat in 2024?

Ransomware attacks continue to pose a growing threat to organizations as it has emerged as the number one threat, affecting 66% of organizations in 2023 and pulling over $1 billion from the victims. These attacks have increased in frequency and sophistication, resulting in significant financial loss, operation disruption, theft of sensitive data, and reduced productivity rates. Also, it damages the organization's reputation and results in the loss of customer trust and compliance violations.

What You Need to Know About the DORA Regulation #dora #securityawareness #eudataregulation #shorts

Richard Cassidy, EMEA Field CISO at Rubrik, shares how DORA ensures that financial institutions and their service providers can withstand and quickly recover from technology disruptions, maintaining a stable and secure financial environment in the EU.

Data Security Posture Management: Enhancing Data Visibility and Control to Safeguard Cloud Native Applications

Wednesday, Jul 31st, 2024 Data breaches are a constant threat in today’s cybersecurity landscape, putting organizations’ sensitive information at risk. As businesses move to cloud-native environments, securing data becomes even more crucial. Data Security Posture Management (DSPM) is a proactive approach that helps organizations manage and protect their data assets.

Unified API Protection: What It Is & How It Helps Secure API Landscape

Application Programming Interfaces (APIs) are the connecting tissue that enables the communication between applications, internal and external, and facilitate data exchange on a massive scale. In a world where information is the crown jewel of an organization, APIs are driving the delivery of digital services to customers and partners. While their usage is already exploding, the growing popularity of cloud-native technologies and microservices has only accelerated API adoption.

The Impending SIEM Wars: What Market Consolidation Means for Customers

The cybersecurity landscape is rapidly evolving, and nowhere is this more evident than in the Security Information and Event Management (SIEM) market. This period of transformation, marked by strategic mergers and high-stakes buyouts, signals not only a race for market dominance, but also the potential for profound changes in how cybersecurity solutions will operate in the future.