Today’s most damaging security threats do not always originate from malicious outsiders or malware as you might expect, but from your trusted insiders with access to sensitive data and systems. Both malicious and negligent insiders can wreak havoc on the security of...
Collaboration and Access Come with a Price Digital transformation and collaboration tools have revolutionized how we use and share information. It’s easier than ever to share ideas, documents and pose questions to co-workers and third-party vendors. However, these...
Today at Microsoft Inspire in Las Vegas we announced that NC Protect now utilizes Microsoft Information Protection (MIP) labels to enhance conditional access and data security controls in Microsoft platforms to guard against insider threats, sensitive data misuse,...
Anyone under the impression that GDPR enforcement would be eased into the market got a huge wake-up call this week. A $230M sized wake-up call. British Airways was fined by the UK privacy watchdog the Information Commissioner’s Office (ICO) as punishment for the data...
This is an excerpt of an article published in Cyber Defense Magazine (CDM) on July 1, 2019 By Dr. Steve Marsh, Vice President of Product for Nucleus Cyber Enterprise collaboration is changing rapidly. Driven by the Cloud and how we share information in our personal...