logo
Enterprises To Redefine Cyber Resilience With Rackspace And Rubrik

Enterprises To Redefine Cyber Resilience With Rackspace And Rubrik

Scoop01-05-2025

SAN FRANCISCO , April 30, 2025 -- LIVE! from RSAC, Rubrik (NYSE: RBRK), a leading cybersecurity company, and Rackspace Technology ® (NASDAQ: RXT), a leading end-to-end hybrid cloud and AI solutions company, today announced a strategic partnership. The two companies will collaborate to deliver a fully managed isolated recovery service, Rackspace Cyber Recovery Cloud powered by Rubrik, to help enterprises achieve true cyber resilience and ensure business continuity in the event of a cyber attack.
By combining Rubrik's data protection and cyber recovery software with Rackspace's hybrid cloud expertise and global data centre footprint, this partnership addresses immediate cyber recovery needs and empowers businesses to reduce their operational risk as a competitive advantage.
Why does this matter?
Organisations today face increasing ransomware threats, with attacks becoming more sophisticated, frequent, and devastating as 92 per cent of victims experience data encryption and 60 per cent suffer data theft. Traditional backup and recovery solutions can take weeks or months to restore business operations.
Designed as an isolated on-demand or dedicated managed solution, the Rackspace Cyber Recovery Cloud powered by Rubrik gives enterprises access to an air-gapped platform to recover mission-critical workloads following a cyber attack. The solution aims to provide enterprises with an orchestrated recovery approach designed to enable restoration in hours instead of days, weeks or months, thereby providing business continuity in a clean, isolated environment.
'The launch of Rackspace Cyber Recovery Cloud powered by Rubrik comes at a critical time as ransomware incidents and compliance risks continue to escalate, while traditional backup and disaster recovery solutions have become insufficient, cost-prohibitive, and technically challenging,'' said Amar Maletira, CEO of Rackspace Technology.
'This strategic partnership with Rubrik fills a recognised gap in the market and delivers something truly unique – the ability to recover data as well as rapidly restore operational capability in a clean, isolated environment in hours rather than days or weeks.'
The new offering is designed to meet the operational continuity needs of organisations across non-regulated and highly regulated industries such as banking, financial services, insurance, and healthcare, where seamless operations and data integrity are vital.
"As we chart the course for a more secure digital future, our collaboration with Rackspace Technology represents the paramount next step in our journey," said Bipul Sinha, CEO, Chairman, and Co-founder of Rubrik. "Unified as a cohesive force, we aim to provide customers with a robust and streamlined approach to cyber recovery, ensuring the safeguarding of vital data and uninterrupted business continuity."
Rackspace Cyber Recovery Cloud powered by Rubrik: A Confident Path to Cyber Resilience
Rackspace Cyber Recovery Cloud powered by Rubrik, enables customers to replicate their validated backups, ensuring data remains secure and ready for rapid deployment. In the event of a cyber attack, Rubrik can quickly identify clean, safe backup data. At the same time, Rackspace can restore critical workloads within hours to an isolated recovery environment entirely separate from the customer's production and disaster recovery systems all managed by Rackspace.
"Rackspace Cyber Recovery Cloud delivers a robust, Rubrik-powered solution that ensures swift and secure workload restoration in the face of cyber attacks," states Steven Dickens, CEO and Principal Analyst, HyperFRAME Research. "Its on-demand and dedicated options provide cost-effective flexibility for organisations navigating rising ransomware threats and compliance demands."
Guiding organisations through cyber resiliency planning and implementation.
Cyber Recovery Readiness Assessment: To prepare for a successful deployment of Rackspace Cyber Recovery Cloud powered by Rubrik, it is critical to conduct a complete cyber readiness assessment that identifies critical applications, maps dependencies, and prioritises workloads based on business impact. The result is a clear, actionable roadmap tailored to the organisation's specific recovery goals.
Cyber Recovery Cloud On-Boarding: Following the readiness assessment, this service is designed to ensure seamless configuration and testing of Rackspace Cyber Recovery Cloud powered by Rubrik. This includes engineers configuring the isolated recovery environment, building recovery templates, testing real-world scenarios, and delivering a tailored business continuity plan that aligns with operational needs and the customer's recovery targets.
About Rackspace Technology
Rackspace Technology is a leading end-to-end, hybrid and AI solutions company. We can design, build, and operate our customers' cloud environments across all major technology platforms, irrespective of technology stack or deployment model. We partner with our customers at every stage of their cloud journey, enabling them to modernise applications, build new products, and adopt innovative technologies.
About Rubrik
Rubrik (NYSE: RBRK) is on a mission to secure the world's data. With Zero Trust Data Security™, we help organisations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organisations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.
For more information, please visit www.rubrik.com and follow @rubrikInc on X (formerly Twitter) and Rubrik on LinkedIn.
SAFE HARBOR STATEMENT:
This press release contains express and implied 'forward-looking statements' within the meaning of the Private Securities Litigation Reform Act of 1995, including statements regarding Identity Resilience and its anticipated benefits for our customers. By their nature, these statements are subject to numerous uncertainties and risks, including factors beyond our control, that could cause actual results, performance or achievement to differ materially and adversely from those anticipated or implied in the statements, including those described under the caption 'Risk Factors' and elsewhere in our most recent filings with the Securities and Exchange Commission, including our annual report on Form 10-K for the fiscal year ended January 31, 2025. Forward-looking statements speak only as of the date the statements are made and are based on information available to us at the time those statements are made and/or management's good faith belief as of that time with respect to future events. We assume no obligation to update forward-looking statements to reflect events or circumstances after the date they were made, except as required by law.
Any unreleased services or features referenced in this document are not currently available and may not be made generally available on time or at all, as may be determined in our sole discretion. Any such referenced services or features do not represent promises to deliver, commitments, or obligations of Rubrik, Inc. and may not be incorporated into any contract. Customers should make their purchase decisions based upon services and features that are currently generally available.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Exclusive: SquareX's Audrey Adeline on why the browser is 'the new endpoint'
Exclusive: SquareX's Audrey Adeline on why the browser is 'the new endpoint'

Techday NZ

time2 days ago

  • Techday NZ

Exclusive: SquareX's Audrey Adeline on why the browser is 'the new endpoint'

The browser is the new battleground. That's the message from Audrey Adeline of cybersecurity company SquareX, who has launched a practical Browser Detection and Response Manual to help organisations understand and defend against attacks in what she calls "the most used app on your device." "Eighty per cent of the time spent on a device is now in the browser," she explained to TechDay during a recent interview. "Yet it's one of the least protected surfaces in cybersecurity." Unveiled at the RSA Conference (RSAC'25) earlier this year, the manual has struck a chord with security leaders worldwide, selling out quickly and prompting strong feedback. The manual, written by Audrey Adeline and Vivek Ramachandran is titled: 'The Browser Security Field Manual'. "We were one of the top-selling books at the RSA bookstore," Adeline said. "A lot of CISOs reached out to us afterwards to say it helped their teams rethink browser security." Originally from Indonesia, Adeline's own path into tech was unconventional. "I grew up in a very traditional economy. Most of my family ran consumer businesses - nobody was in STEM," she said. After studying biochemistry at Cambridge and working in cancer research, she pivoted into consulting, and eventually joined Sequoia to evaluate tech companies, including cybersecurity firms. Her passion for deep tech and research led her to SquareX, where she now leads the Year of Browser Bugs (YOBB) project, uncovering browser-based architectural vulnerabilities each month. These include high-profile exploits like polymorphic extensions, which can impersonate legitimate browser tools like password managers and crypto wallets. "The danger is users don't realise they're entering credentials into a fake extension," Adeline explained. "These are architectural issues that legitimate browser features enable, and they're much harder to detect or patch." That urgency drove the creation of the manual. "We kept seeing the same problem - people using the browser constantly, but having very little visibility or protection," she said. "Existing tools just don't give you a clear picture of how the breach occurred." The manual's first edition is now being followed by a second, set for release at DEF CON and Black Hat in August. It will feature commentary from CISOs at Fortune 500 companies to ground the guidance in real-world enterprise experience. "We didn't want to just make it theoretical," Adeline said. "Each chapter now includes perspectives on actual problems faced by security teams." Access to the manual is currently via request form, though Adeline said digital availability is expected closer to August. Developing the manual was not without challenges. "The biggest hurdle was the lack of consolidated resources," she said. "There's research out there, but it's scattered. We had to pull together a lot of primary sources and make it digestible - from beginner concepts to advanced attacks." Browser-based threats have spiked recently, with attackers targeting the browser as the new endpoint for enterprise data. "Think about it," she said. "We don't download files anymore. Our files, apps, identities - everything is now in the browser. It's where 60 to 70 per cent of enterprise data lives." Adeline warned that the shift in attacker behaviour is permanent. "It's not just a trend. There's a fundamental change in how we work, and attackers are following the data." To help teams assess their own posture, SquareX has also launched a free browser attack testing tool. "Seeing is believing," she said. "You can test against 49 different browser-based attacks and see which ones bypass your current solutions." She sees two main approaches to browser defence: dedicated secure browsers, or solutions like SquareX's browser extension, which converts any existing browser into a secure one. "Most organisations can't migrate everyone to a new browser," she said. "Extensions are more practical, and updates are seamless." SquareX positions itself as the EDR for the browser, focusing on detection and response at a granular level. "We're obsessed with user experience. You can't compromise productivity just to get security," she said. The company's design avoids the risks of dedicated browsers, which often lag behind on security patches. "Every time Chrome issues a patch, those browsers need to be updated manually. That creates a gap where zero-days can thrive," she explained. Future plans include a red team edition of the manual and continuous updates as attacks evolve. "I wouldn't be surprised if there are multiple versions by next year," Adeline said. Her advice to security leaders just waking up to the browser as a threat vector is clear: "You need browser-native security to tackle browser-native threats." Adeline believes the industry must go beyond reacting to breaches and start anticipating them. "The best defence is understanding what attackers are doing," she said. "You can't just play catch-up." For her, the inclusion of peer input in the manual is crucial. "Security leaders want to hear from their peers. They need validation that this is a permanent shift, not a passing concern," she said. Asked what's changed to make browsers such a prime target now, Adeline points to a confluence of technology and behaviour. "Chrome has added countless new features like WebAssembly and WebRTC. These make browsers powerful enough to replace local apps," she explained. "Since COVID, we've seen everything move online. Now attackers are simply going where the data is." "The browser is the new endpoint," she said. "It's where we work - and where we're vulnerable."

DoubleVerify Issues Industry Alert For Ads.txt Exploits
DoubleVerify Issues Industry Alert For Ads.txt Exploits

Scoop

time22-05-2025

  • Scoop

DoubleVerify Issues Industry Alert For Ads.txt Exploits

Press Release – DoubleVerify Growing attacks – including DV-identified AI slop scheme, Synthetic Echo – highlight how fraudsters manipulate and exploit as the number of cases now exceeds 100 Sydney, AUSTRALIA – May 23, 2025 — DoubleVerify ('DV') (NYSE: DV), a leading software platform for digital media measurement, data, and analytics, today issued guidance in its Transparency Center to help advertisers navigate a rise in schemes designed to exploit — the industry standard that enables publishers and platforms to publicly declare authorised digital inventory sellers. The DV Fraud Lab has identified more than 100 cases of deception since the standard's launch in May 2017, with a significant increase in recent years, as fraudsters manipulate the system to appear legitimate and divert ad spend away from trusted publishers. 'Bad actors are exploiting and advertisers often have no idea it's happening,' said Gilit Saporta, Head of the DV Fraud Lab. 'It's a growing risk that demands more scrutiny from buyers, sellers and vendors.' The scale of this deception is evident in Synthetic Echo, a network of over 200 AI-generated, ad-supported websites recently uncovered by the DV Fraud Lab. Monetised through multiple SSPs and exchanges, Synthetic Echo churns out low-quality AI content and uses deceptive domain names — like and — to mislead programmatic platforms and buyers into mistaking them for legitimate publishers. According to DV's analysis — detailed in the public alert available on DV's website — the deception extends to files. The DV Fraud Lab found near-identical files replicated across Synthetic Echo sites, exposing how fraudsters scale these schemes by cloning authorised seller lists. After DV publicised information about Synthetic Echo in January, a Wired report prompted several of the news publishers whose brands were misused to say they plan to pursue legal action. About DoubleVerify DoubleVerify ('DV') (NYSE: DV) is the industry's leading media effectiveness platform that leverages AI to drive superior outcomes for global brands. By powering media efficiency and performance, DV strengthens the online advertising ecosystem, preserving the fair value exchange between buyers and sellers of digital media.

DoubleVerify Issues Industry Alert For Ads.txt Exploits
DoubleVerify Issues Industry Alert For Ads.txt Exploits

Scoop

time22-05-2025

  • Scoop

DoubleVerify Issues Industry Alert For Ads.txt Exploits

Sydney, AUSTRALIA – May 23, 2025 — DoubleVerify ('DV') (NYSE: DV), a leading software platform for digital media measurement, data, and analytics, today issued guidance in its Transparency Center to help advertisers navigate a rise in schemes designed to exploit — the industry standard that enables publishers and platforms to publicly declare authorised digital inventory sellers. The DV Fraud Lab has identified more than 100 cases of deception since the standard's launch in May 2017, with a significant increase in recent years, as fraudsters manipulate the system to appear legitimate and divert ad spend away from trusted publishers. 'Bad actors are exploiting and advertisers often have no idea it's happening,' said Gilit Saporta, Head of the DV Fraud Lab. 'It's a growing risk that demands more scrutiny from buyers, sellers and vendors.' The scale of this deception is evident in Synthetic Echo, a network of over 200 AI-generated, ad-supported websites recently uncovered by the DV Fraud Lab. Monetised through multiple SSPs and exchanges, Synthetic Echo churns out low-quality AI content and uses deceptive domain names — like and — to mislead programmatic platforms and buyers into mistaking them for legitimate publishers. According to DV's analysis — detailed in the public alert available on DV's website — the deception extends to files. The DV Fraud Lab found near-identical files replicated across Synthetic Echo sites, exposing how fraudsters scale these schemes by cloning authorised seller lists. After DV publicised information about Synthetic Echo in January, a Wired report prompted several of the news publishers whose brands were misused to say they plan to pursue legal action. Click here to review DV's full guidance and best practices regarding About DoubleVerify DoubleVerify ('DV') (NYSE: DV) is the industry's leading media effectiveness platform that leverages AI to drive superior outcomes for global brands. By powering media efficiency and performance, DV strengthens the online advertising ecosystem, preserving the fair value exchange between buyers and sellers of digital media.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store