Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Prioritized Recovery for Object Storage: Restore what matters most, first!

When you need to recover an S3 bucket or Azure Blob container, you probably don't need all of it back at once. Your app config files, your latest data partitions, your active transaction logs — those need to be online now. Last year's holiday party photos — well, they can follow.

Detecting Adversary Intent: Analyzing Behavioral Tells in Admin Logs with Allison Wikoff

Adversaries are already logging into your network using your own admin credentials. In this episode, Caleb Tolin sits down with Allison Wikoff to move past the identity clichés and analyze the specific behavioral signals that separate routine IT maintenance from state-sponsored sabotage. They dissect why resilience is not a flash of genius during a crisis, but a mindset that organizations can adopt to stay ahead of dynamic threat actors.

Rubrik SAGE: Semantic Agent Control That Scales for the Enterprise

Are you ready to take control of your AI agents with Rubrik Agent Cloud? Traditional keyword filters aren't enough when agents are acting autonomously. You need a true AI governance engine to manage them effectively! SAGE is our semantic AI governance engine that allows you to define custom policies using natural language and block risky tools in real time. Ready to secure your autonomous agents? Dive into SAGE and learn more by checking out our website.

Enforcing GitHub Repository Backups with Rubrik and GitHub Actions

Your CI pipeline enforces tests, security scans, and policy checks before code hits production. But your backups? Still running on a schedule, completely disconnected from your deployments. In this video, I'll walk you through how to use Rubrik's powerful APIs to build what I'm calling "Backup as Code": a GitHub Action that triggers an on-demand Rubrik snapshot of your GitHub repository every time code is merged into the main branch. We'll look at the action code, wire it up to a live repo, and watch the whole thing run end to end.

Ransomware in Healthcare: It's Disruption, Distraction, and Data Theft

Ransomware attacks are about disruption, distraction, and data theft happening at the same time. Nelson Carreira breaks down how modern threat actors operate. While one attack disrupts operations, another may be quietly exfiltrating sensitive data. That complexity is why healthcare organizations must prepare for recovery environments that allow clinical operations to continue safely while production systems are rebuilt.

AI Takes Over RSAC Conference (Now What?) with Dave Bittner

In this RSAC 2026 Conference recap, Dave Bittner, Host of the CyberWire Daily podcast, joins Data Security Decoded host Caleb Tolin from the guest seat to discuss the biggest theme dominating the conference: artificial intelligence, and, more specifically, agentic AI. From wall-to-wall AI messaging across San Francisco to in-depth conversations with security leaders and analysts, one thing became clear: the industry has moved past debating whether AI will take hold. It already has. Now, the focus has shifted to making it safe.

Why Incident Response Fails (And It's Not the Technology)

Incident response plans rarely fail because of technology. It’s usually because of coordination, or the lack of. Nelson Carreira explains why organizations that build isolated recovery environments should use them not only for recovery testing but also to strengthen incident response planning. Simulation exercises reveal a critical need: clear roles, leadership authority, and secure communication channels during a crisis.

Cyber Resilience in Healthcare: Why Recovery Starts at the Endpoint

On this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, Nelson Carreira explains why recovery planning in healthcare has to consider the entire environment, from user devices to network architecture. In large incidents, the blast radius can extend far beyond servers, sometimes forcing organizations to rebuild tens of thousands of endpoints before operations can safely resume. As he puts it.

What Happens When Healthcare Systems Go Dark

• What happens inside a healthcare system when ransomware takes down Active Directory and authentication fails? In this episode, Josh Howell sits down with Nelson, Executive Healthcare Strategist at CDW, to explore real-world cyber incidents and the architectural shifts required to recover safely. You’ll learn: YouTube Chapters Final Lessons for Healthcare Leaders If you enjoyed this episode, be sure to subscribe to our YouTube channel.