Blog

Stay up to date on industry trends, security advice, product news and more.

Supporting Our Customers’ New Norm – Working from Home

Supporting Our Customers’ New Norm – Working from Home

We’re here to help you navigate some of the IT and collaboration challenges in front of you as well all adapt to the new norm – working from home.
3 Tips to Ensure Secure Collaboration as Companies Mandate Work from Home

3 Tips to Ensure Secure Collaboration as Companies Mandate Work from Home

As organizations rush deploy collaboration tools so employees can work from home, they need to ensure another important asset isn't at risk – their business data using these 3 tips.
Conducting a SharePoint Security Audit

Conducting a SharePoint Security Audit

Learn best practice for managing SharePoint security risks and how to perform a SharePoint security audit to uncover these risks.
Nucleus Cyber Takes Home 5 Gold and Silver 2020 Cybersecurity Excellence Awards

Nucleus Cyber Takes Home 5 Gold and Silver 2020 Cybersecurity Excellence Awards

We’re excited to announce NC Protect has earned five Gold and Silver Awards in the 2020 Cybersecurity Excellence Awards for Access Control, Application Security, Insider Threat Solution, Data-Centric Security and Data Leakage Prevention (DLP).
SharePoint Security Best Practices Guide

SharePoint Security Best Practices Guide

SharePoint security is an important topic that should interest anyone who either works or manages it. There are multiple touch points that if misconfigured can result in a security breach. In this article we’ll talk about several of the most useful practices when it comes to SharePoint security and its best practice configurations.
Leveraging Azure Information Protection for Fine Grained Access and Sharing Control

Leveraging Azure Information Protection for Fine Grained Access and Sharing Control

Learn how NC Protect leverages key Azure Information Protection capabilities to provide fine-grained, data-centric security for collaboration in Microsoft Office 365 applications including Teams, SharePoint, Exchange, OneDrive and Yammer.
NC Protect Earns 5 Finalist Spots in the 2020 Cybersecurity Excellence Awards

NC Protect Earns 5 Finalist Spots in the 2020 Cybersecurity Excellence Awards

We’re pleased to announce NC Protect has earned five finalist nominations in the 2020 Cybersecurity Excellence Awards for: Access Control, Application Security, Insider Threat Solution, Data-Centric Security, and Data Leakage Prevention (DLP).
NC Protect Secures 5 Nominations in the Cybersecurity Excellence Awards

NC Protect Secures 5 Nominations in the Cybersecurity Excellence Awards

Nucleus Cyber’s NC Protect Secures 5 Nominations in the 2020 Cybersecurity Excellence Awards. Love NC Protect? Show Your Support with a Vote!
CPS Takeaways on Securing Collaboration from Insider Threats

CPS Takeaways on Securing Collaboration from Insider Threats

Together with our intranet solution partner LiveTiles, we delivered a session on “How to Secure Collaboration from Insider Threats” at CPS 2019. Here’s a great summary of our presentation which recently appeared in M&E Daily.
Insider Threats Will Continue to Plague Organizations in 2020

Insider Threats Will Continue to Plague Organizations in 2020

Why rising insider threats promise be a top 2020 enterprise security problem and how to solve the paradox of secure collaboration.
Happy Holidays from Nucleus Cyber

Happy Holidays from Nucleus Cyber

From all of us at Nucleus Cyber, May Your Holidays and New Year be Filled with Joy.
Top 5 Data Security Blogs of 2019 from Nucleus Cyber

Top 5 Data Security Blogs of 2019 from Nucleus Cyber

2019 has been a memorable year in cybersecurity with growing threats and new statistics indicating that battle for data security is far from solved. This is a perfect time to reflect on the challenges and successes in 2019 and share the top 5 blogs
Nucleus Cyber Named a Most Trusted Microsoft Technology Partner by CIO Techie

Nucleus Cyber Named a Most Trusted Microsoft Technology Partner by CIO Techie

Nucleus Cyber Named a Most Trusted Microsoft Technology Partner in CIO Techie for Providing Data-Centric Security for Secure Collaboration
As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information

As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information

This post by Nucleus Cyber's Steven Marsh originally appear in Dark Reading 
5 Things from Microsoft Ignite that Excite

5 Things from Microsoft Ignite that Excite

It’s Microsoft Ignite! Over 25,000 attendees descended on Orlando this week to hear about Microsoft’s latest and ...
When Pillow Talk Risks National Security – Preventing Malicious Insider Threats

When Pillow Talk Risks National Security – Preventing Malicious Insider Threats

This isn’t a story from a late-night TV thriller or spy novel. It’s the real story of how Henry Frese allegedly stole government secrets from early to mid-2018 until his arrest earlier this month. It’s a nightmare scenario that can happen to any company or agency without proper controls in place.
Proactive vs. Reactive Security – How to Prevent Not Just Detect Insider Threats

Proactive vs. Reactive Security – How to Prevent Not Just Detect Insider Threats

How to prevent an insider threat from occurring in the first place versus trying to assess if a user’s behavior is suspect after the damage is done.
NC Protect Now on Microsoft Azure Marketplace

NC Protect Now on Microsoft Azure Marketplace

Azure customers can now benefit from our tight integration with Microsoft AIP providing fine-grained, data-centric security to expand protection and control over all of their Microsoft collaboration and enterprise social data.