Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.

Healthcare's Biggest Cybersecurity Risk: Insider Threats! #shorts #podcast #cybersecurity

Maria Roat, Former Deputy Federal CIO emphasizes that, “If healthcare personnel aren’t trained, not just on threats, but insider risks—cybersecurity will always fall short.” Cybersecurity starts with people. Hear Maria’s take on why healthcare teams must lead the charge. Catch Maria's powerful insights on with Travis Rosiek. Discover: The impact of insider threats Why training healthcare teams is critical How cybersecurity saves lives.

Cybersecurity Leadership Transitions with Maria Roat, Former US Deputy Federal CIO

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.

Data Detection and Response (DDR): Stopping an Attack in its Tracks

In this episode of Into the Breach, host James Purvis dives into the cutting-edge world of Data Detection and Response (DDR) with data security expert Drew Russell. Together, they explore how DDR can halt cyberattacks in their tracks by combining autonomous asset inventory, user activity insights, and data classification for a comprehensive defense strategy.

The Future of Access Management

In this episode of Into the Breach, host James Purvis welcomes Kanika Thapar, Senior Director of Product Management, to discuss the evolving challenges in access management. Kanika dives into the explosion of identities, permissions, and overexposed sensitive data that leave organizations vulnerable. Learn how threat actors exploit access vulnerabilities and why traditional manual processes struggle to keep up.