Page de couverture de Data Security Decoded

Data Security Decoded

Data Security Decoded

Auteur(s): Rubrik
Écouter gratuitement

À propos de cet audio

Welcome to the Data Security Decoded podcast — your guide to navigating the complex world of data protection. Each episode breaks down key cybersecurity issues and cyber resilience strategies in clear, accessible language. We speak with business leaders and cybersecurity experts to keep you informed about the latest trends and help you future-proof your data security. Join us on this essential journey.Copyrights © 2024 All Rights Reserved by Rubrik Politique Économie
Épisodes
  • Scattered Spider: the Evolution of Identity-Based Ransomware
    Sep 23 2025
    In this episode of Data Security Decoded, join Caleb Tolin as he welcomes back Joe Hladik, Head of Rubrik Zero Labs, to explore how modern adversaries like Scattered Spider are reshaping the ransomware landscape. From double extortion schemes to identity compromise and hypervisor encryption, Joe explains why these attackers succeed where traditional defenses fail and what security leaders must do to embed resilience and recovery at the core of their strategy. • Learn how double extortion turns data theft into a two-payout playbook • Hear why identity compromise and social engineering bypass even strong defenses • Understand why breakout times as fast as 48 minutes change the response equation • Get practical ways to build resilience and recovery without reintroducing attacker backdoors
    Voir plus Voir moins
    12 min
  • Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance
    Aug 26 2025
    In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore the realities of Chinese state-backed cyber operations. From the fragmented nature of China’s threat actor ecosystem to its growing focus on critical infrastructure, discover how cultural, political, and economic structures shape one of the world's most strategic cyber landscapes. Whether you’re defending critical infrastructure or shaping policy, this conversation provides clarity on China’s cyber strategy and what it means for global security. • Learn why Chinese cyber operations are fragmented, not centrally controlled • Explore how cultural and political structures influence Chinese threat actors • Understand which critical infrastructure sectors are most frequently targeted and why • See how China’s 14th Five-Year Plan shaped cyber operations and what to expect from the 15th
    Voir plus Voir moins
    28 min
  • Breaking the Intelligence-Defense Divide with Scott Scher
    Aug 13 2025
    In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Scott Scher, a cyber threat intelligence (CTI) expert with an unconventional backstory, to explore how his four years living off the grid shaped his belief that protecting technology isn’t just technical work, it’s about resilience, strategy, and thinking differently. From redefining CTI as “counter-threat intelligence” to breaking down the walls between intelligence teams, defenders, and policy leaders, Scott explains how to turn raw intel into actionable security decisions that strengthen organizations where it matters most. • Learn why threat intelligence should be seen as cover, helping defenders justify and prioritize their actions • Hear how Scott’s off-grid lifestyle influenced his approach to resilience and technology reliance • Understand why “intel vs. defense” is the wrong mindset and what real collaboration looks like • Get practical ways to transform raw threat data into clear, actionable defense strategies
    Voir plus Voir moins
    24 min
Pas encore de commentaire