Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Never Let a Good Crisis Go to Waste - CISO's Powerful Take on Security Improvement

Amy Bogac, CISO at Elevate Textiles, shares her candid approach to cybersecurity program management. She emphasizes the importance of distinguishing between immediate fixes and long-term improvements after security incidents. Key insights: Set clear boundaries between incident resolution and continuous improvement Use security incidents as leverage for necessary program investments Learn from every crisis to strengthen your security posture Distinguish between short-term fixes and long-term strategic improvements.

Modern Storage Meets Cyber Resilience: The Rubrik and Pure Storage Solution Architecture for Unstructured Data

Additional contributor: Dan Kogan, VP of Enterprise Growth and Solutions at Pure Storage Rubrik and Pure Storage have partnered to deliver a reference architecture solution that enables organizations to unify, manage, and secure unstructured data at scale. According to projections from UBS, data volumes will reach as much as 660 zettabytes—or 129GB per person on Earth—by 2030.

Beyond AWS Native Backup: A Simpler Path to Data Protection

We are often asked how Rubrik Security Cloud differs from AWS Backup. It's a valid question because, at first glance, the two solutions seem similar. Both have cloud-first, API-driven architectures. Both are built specifically to ensure reliable backup and recovery for data stored across AWS. Both support a wide range of the most popular AWS workloads including EC2, EBS, S3, RDS and EKS.

Building High Availability into a Large Cloud SQL Fleet, Part 2: Optimizations and Design Choices

At Rubrik, we rely on a multi-tenant architecture to store customer metadata in a large fleet of Cloud SQL database instances. With numerous production deployments globally, each supporting multiple customer accounts, maintaining high availability, performance, and robustness across this infrastructure is critical. Managing a large fleet of Cloud SQL instances and ensuring they remain resilient and performant has been a journey filled with valuable lessons.

Sue Bergamo - Confidentiality, Integrity, and Availability - CIA Triad

“This isn't a job for the faint of heart. If people can't understand the triad that CISOs abide by—confidentiality, integrity, and availability—then it’s our job to make them understand.” Sue Bergamo Exciting news! In our latest episode of Data Security Decoded, we had the pleasure of hosting Sue Bergamo, CIO and CISO at BTE Partners.

The Hidden Cost of Hospital Cyber Attacks: What Happens to Patients? #Healthcare #DataSecurity

What happens to patients when their local hospital has a ransomware attack? How do you even find that? You collect data on every cyberattack on a healthcare provider. Next, you look at data from Medicare and then overlay those two data sets. Simple. Listen to the latest episode of the @Data Security Decoded podcast, where @Steve Stone is joined by @Hannah Neprash, PhD, Assistant Professor at the University of Minnesota School of Public Health.

Faster Remediation with Data-Centric Security Insights

In this episode of Into the Breach, James Purvis and Mike Schmidt discuss how adopting a data-centric security approach can lead to faster remediation and better alert prioritization. With SOC teams overwhelmed by millions of alerts, they explore how DSPM (Data Security Posture Management) provides visibility, reduces noise, and focuses on protecting sensitive data. Learn how DSPM can help streamline security operations and safeguard your business-critical assets.

Relax, you've got Rubrik in your corner!

With Rubrik Security Cloud, you’ll be unstoppable against cyberattacks. You can protect your data wherever it lives: across the enterprise, in SaaS applications, and in the cloud. You’ll also be able to continuously monitor data risks, and recover data and applications quickly. We take great pride in helping IT and security teams find peace of mind. With Rubrik, your team can rest easy knowing your data is secure and resilient.

Enhancing Government Security with Continuous Threat Monitoring by Rubrik

The government sector is facing growing cybersecurity threats that require robust solutions to safeguard sensitive data and critical infrastructure. With rapidly evolving threats—from adversarial actions from politically unstable state actors to GenAI-powered social engineering and phishing campaigns—the government sector faces a pressing need to transition from reactive threat monitoring to proactive threat monitoring.