Blog
Stay up to date on industry trends, security advice, product news and more.
Supporting Our Customers’ New Norm – Working from Home
We’re here to help you navigate some of the IT and collaboration challenges in front of you as well all adapt to the new norm – working from home.
3 Tips to Ensure Secure Collaboration as Companies Mandate Work from Home
As organizations rush deploy collaboration tools so employees can work from home, they need to ensure another important asset isn't at risk – their business data using these 3 tips.
Conducting a SharePoint Security Audit
Learn best practice for managing SharePoint security risks and how to perform a SharePoint security audit to uncover these risks.
Nucleus Cyber Takes Home 5 Gold and Silver 2020 Cybersecurity Excellence Awards
We’re excited to announce NC Protect has earned five Gold and Silver Awards in the 2020 Cybersecurity Excellence Awards for Access Control, Application Security, Insider Threat Solution, Data-Centric Security and Data Leakage Prevention (DLP).
SharePoint Security Best Practices Guide
SharePoint security is an important topic that should interest anyone who either works or manages it. There are multiple touch points that if misconfigured can result in a security breach. In this article we’ll talk about several of the most useful practices when it comes to SharePoint security and its best practice configurations.
Leveraging Azure Information Protection for Fine Grained Access and Sharing Control
Learn how NC Protect leverages key Azure Information Protection capabilities to provide fine-grained, data-centric security for collaboration in Microsoft Office 365 applications including Teams, SharePoint, Exchange, OneDrive and Yammer.
NC Protect Earns 5 Finalist Spots in the 2020 Cybersecurity Excellence Awards
We’re pleased to announce NC Protect has earned five finalist nominations in the 2020 Cybersecurity Excellence Awards for: Access Control, Application Security, Insider Threat Solution, Data-Centric Security, and Data Leakage Prevention (DLP).
NC Protect Secures 5 Nominations in the Cybersecurity Excellence Awards
Nucleus Cyber’s NC Protect Secures 5 Nominations in the 2020 Cybersecurity Excellence Awards. Love NC Protect? Show Your Support with a Vote!
CPS Takeaways on Securing Collaboration from Insider Threats
Together with our intranet solution partner LiveTiles, we delivered a session on “How to Secure Collaboration from Insider Threats” at CPS 2019. Here’s a great summary of our presentation which recently appeared in M&E Daily.
Insider Threats Will Continue to Plague Organizations in 2020
Why rising insider threats promise be a top 2020 enterprise security problem and how to solve the paradox of secure collaboration.
Happy Holidays from Nucleus Cyber
From all of us at Nucleus Cyber, May Your Holidays and New Year be Filled with Joy.
Top 5 Data Security Blogs of 2019 from Nucleus Cyber
2019 has been a memorable year in cybersecurity with growing threats and new statistics indicating that battle for data security is far from solved. This is a perfect time to reflect on the challenges and successes in 2019 and share the top 5 blogs
Nucleus Cyber Named a Most Trusted Microsoft Technology Partner by CIO Techie
Nucleus Cyber Named a Most Trusted Microsoft Technology Partner in CIO Techie for Providing Data-Centric Security for Secure Collaboration
As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information
This post by Nucleus Cyber's Steven Marsh originally appear in Dark Reading
5 Things from Microsoft Ignite that Excite
It’s Microsoft Ignite! Over 25,000 attendees descended on Orlando this week to hear about Microsoft’s latest and ...
When Pillow Talk Risks National Security – Preventing Malicious Insider Threats
This isn’t a story from a late-night TV thriller or spy novel. It’s the real story of how Henry Frese allegedly stole government secrets from early to mid-2018 until his arrest earlier this month. It’s a nightmare scenario that can happen to any company or agency without proper controls in place.
Proactive vs. Reactive Security – How to Prevent Not Just Detect Insider Threats
How to prevent an insider threat from occurring in the first place versus trying to assess if a user’s behavior is suspect after the damage is done.
NC Protect Now on Microsoft Azure Marketplace
Azure customers can now benefit from our tight integration with Microsoft AIP providing fine-grained, data-centric security to expand protection and control over all of their Microsoft collaboration and enterprise social data.