Blog

Stay up to date on industry trends, security advice, product news and more.

Insider Threats Will Continue to Plague Organizations in 2020

Insider Threats Will Continue to Plague Organizations in 2020

Why rising insider threats promise be a top 2020 enterprise security problem and how to solve the paradox of secure collaboration.
Happy Holidays from Nucleus Cyber

Happy Holidays from Nucleus Cyber

From all of us at Nucleus Cyber, May Your Holidays and New Year be Filled with Joy.
Top 5 Data Security Blogs of 2019 from Nucleus Cyber

Top 5 Data Security Blogs of 2019 from Nucleus Cyber

2019 has been a memorable year in cybersecurity with growing threats and new statistics indicating that battle for data security is far from solved. This is a perfect time to reflect on the challenges and successes in 2019 and share the top 5 blogs
Govern Application Chaos and Secure Collaboration Data in Microsoft Teams

Govern Application Chaos and Secure Collaboration Data in Microsoft Teams

Introducing Secure Collaboration for Teams from LiveTiles and Nucleus Cyber to easily provision and enable data-centric security in Microsoft Teams.
Nucleus Cyber Named a Most Trusted Microsoft Technology Partner by CIO Techie

Nucleus Cyber Named a Most Trusted Microsoft Technology Partner by CIO Techie

Nucleus Cyber Named a Most Trusted Microsoft Technology Partner in CIO Techie for Providing Data-Centric Security for Secure Collaboration
As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information

As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information

This post by Nucleus Cyber's Steven Marsh originally appear in Dark Reading 
5 Things from Microsoft Ignite that Excite

5 Things from Microsoft Ignite that Excite

It’s Microsoft Ignite! Over 25,000 attendees descended on Orlando this week to hear about Microsoft’s latest and ...
When Pillow Talk Risks National Security – Preventing Malicious Insider Threats

When Pillow Talk Risks National Security – Preventing Malicious Insider Threats

This isn’t a story from a late-night TV thriller or spy novel. It’s the real story of how Henry Frese allegedly stole government secrets from early to mid-2018 until his arrest earlier this month. It’s a nightmare scenario that can happen to any company or agency without proper controls in place.
Proactive vs. Reactive Security – How to Prevent Not Just Detect Insider Threats

Proactive vs. Reactive Security – How to Prevent Not Just Detect Insider Threats

How to prevent an insider threat from occurring in the first place versus trying to assess if a user’s behavior is suspect after the damage is done.
NC Protect Now on Microsoft Azure Marketplace

NC Protect Now on Microsoft Azure Marketplace

Azure customers can now benefit from our tight integration with Microsoft AIP providing fine-grained, data-centric security to expand protection and control over all of their Microsoft collaboration and enterprise social data.
NC Protect Named Access Management Solution of the Year

NC Protect Named Access Management Solution of the Year

Nucleus Cyber is proud to announce we received the 2019 CyberSecurity Breakthrough Award for Access Management Solution of the Year.
As seen in VM Blog: Sharing Data Inside and Outside of the (Drop)Box

As seen in VM Blog: Sharing Data Inside and Outside of the (Drop)Box

3 reasons why Cloud based collaboration tools, like Dropbox, are the best and worst thing to happen to business collaboration and 4 ways to protect shared data.
Secure Collaboration – The Impossible Paradox

Secure Collaboration – The Impossible Paradox

Despite best efforts, the security solutions in use today are only partially effective at protecting sensitive data. A new approach is clearly needed. First, we must understand the impact of modern collaboration demands on information security, as we explore a more effective method to secure collaboration.
National Insider Threat Awareness Month – Resources for Detection and Prevention

National Insider Threat Awareness Month – Resources for Detection and Prevention

September is National Insider Threat Awareness Month! Every organization should take this opportunity to educate themselves on on the importance of safeguarding against insider threats and best practices for mitigating those risks. Check out these resources for Awareness, Detection and Prevention.
Preventing Trade Secret Theft: Examining the Anthony Levandowski Case

Preventing Trade Secret Theft: Examining the Anthony Levandowski Case

Anthony Levandowski's trade secret theft indictment highlights the importance of balancing data protection needs of organizations and employees.
ZD Net: Hybrid cloud serves as bridge to our bright all-cloud future

ZD Net: Hybrid cloud serves as bridge to our bright all-cloud future

This is an excerpt from an article featuring an interview with Nucleus Cyber's Steven Marsh that originally appeared in ZD Net
User Training Alone is Not Enough to Prevent Insider Threats

User Training Alone is Not Enough to Prevent Insider Threats

A recent report from Cybersecurity Insiders looked at what companies believe are the drivers for insider attacks. The top answer - lack of user training. The solution to the problem most cited - more user training. However, more training alone isn’t the answer – training backed by automated enforcement is.
Nucleus Cyber Joins Microsoft Intelligent Security Association to Protect Customers Against Cybersecurity Threats with Tight Technology Integrations

Nucleus Cyber Joins Microsoft Intelligent Security Association to Protect Customers Against Cybersecurity Threats with Tight Technology Integrations

Nucleus Cyber joins the Microsoft Intelligent Security Association