Blog

Stay up to date on industry trends, security advice, product news and more.

Executives are often overlooked as security risks

Executives are often overlooked as security risks

We all know to secure personal information like personally identifiable information (PII), protected healthcare ...
Survey Reveals Damaging Insider Threats Rose to New Highs in the Last 12 Months

Survey Reveals Damaging Insider Threats Rose to New Highs in the Last 12 Months

Today’s most damaging security threats do not always originate from malicious outsiders or malware as you might ...
APRA CPS 234 Information Security Guidance

APRA CPS 234 Information Security Guidance

The Australian Prudential Regulation Authority has created a new prudential standard for information security management APRA CPS 234. Ensure your data security practices comply.
NC Protect Deepens Integration with Microsoft utilizing MIP labels, Enhancing Access and Data Protection Controls

NC Protect Deepens Integration with Microsoft utilizing MIP labels, Enhancing Access and Data Protection Controls

Today at Microsoft Inspire in Las Vegas we announced that NC Protect now utilizes Microsoft Information Protection (MIP) labels to enhance conditional access and data security controls in Microsoft platforms to guard against insider threats, sensitive data misuse, unauthorized sharing and exfiltration.
GDPR Fines Just Got Real – Record Fine for British Airways Data Breach

GDPR Fines Just Got Real – Record Fine for British Airways Data Breach

Anyone under the impression that GDPR enforcement would be eased into the market got a huge wake-up call this week. 3 takeaways every company needs to learn in the wake of this $230M fine.
As seen in CDM: Enterprise Social Collaboration: Security Friend or Foe?

As seen in CDM: Enterprise Social Collaboration: Security Friend or Foe?

This is an excerpt of an article published in Cyber Defense Magazine (CDM) on July 1, 2019 by Dr. Steve Marsh, Vice President of Product for Nucleus Cyber
Mitigate Dropbox Data Breach Risks

Mitigate Dropbox Data Breach Risks

While Dropbox has security capabilities, sensitive information is still at risk from accidental sharing and misconfigured settings caused by human error. To address these risks, NC Protect now supports identification, conditional access and protection of sensitive information in Dropbox and Dropbox Business. 
Defining Sensitive Data to Protect Your Organization’s Critical Assets

Defining Sensitive Data to Protect Your Organization’s Critical Assets

What information are we referring to when we use the term sensitive data? Why defining it too narrowly can put important data at risk.
6 Steps to Shed Light on Dark Data and Mitigate Risk

6 Steps to Shed Light on Dark Data and Mitigate Risk

Is Dark Data Putting You at Risk? With modern collaboration apps, users can create and access data from an ...
New Conditional Access and Security Capabilities for Teams and Yammer

New Conditional Access and Security Capabilities for Teams and Yammer

NC Protect Extends Data Protection Capabilities to Microsoft Teams and Yammer Companies have embraced social ...
Breaches Highlight Why Password Protecting Systems Alone Falls Short

Breaches Highlight Why Password Protecting Systems Alone Falls Short

Several recent high profile breaches had a common single point of failure – location based security. Why the belt and suspenders approach of data-centric security is necessary to properly protect sensitive data.
Microsoft AIP Validates the Data-Centric Security Approach

Microsoft AIP Validates the Data-Centric Security Approach

Earlier this year Microsoft made an announcement that marked a significant in shift their approach to best protect sensitive data with Azure Information Protection (AIP). The announcement validates that now is the time for enterprises to embrace data-centric security solutions in the fight to protect data.
Webinar on How to Balance Collaboration with Data Security

Webinar on How to Balance Collaboration with Data Security

How to Protect Sensitive Data During CollaborationToday’s collaboration and file sharing tools require ...
Re-evaluating Data Security Practices as Healthcare Breaches Reach a Record High

Re-evaluating Data Security Practices as Healthcare Breaches Reach a Record High

Data security is a challenge facing every organization today. Healthcare in particular is highly susceptible due to
Meet Two More Insiders Putting Your Data Security at Risk

Meet Two More Insiders Putting Your Data Security at Risk

We uncover two more insiders in every organization who are inadvertently (and some deliberately) putting your organization at risk and how data-centric security can help stop them in their tracks.
Identifying The Top Insider Threats to Data Security: The Anonymous Admin

Identifying The Top Insider Threats to Data Security: The Anonymous Admin

Discover the insiders found in every organization who are inadvertently (and some deliberately) putting your organization at risk bypassing governance and training, misusing privileges, stealing IP, sharing confidential data with unauthorized parties, and making innocent mistakes.
Box Data Leaks – Location-Based Security Failure Impacts 90 Companies

Box Data Leaks – Location-Based Security Failure Impacts 90 Companies

Sensitive corporate and customer data from 90 companies, including Apple, Box and Discovery Network, exposed on Box underscores the need for more mature, data-centric security. A look at what happened and 4 tips for a adopting a data-centric strategy.
Controlling Data Misuse in an Age of Digital Collaboration

Controlling Data Misuse in an Age of Digital Collaboration

Ever receive an email with confidential information not meant for you? Just like that you’re part of a data breach. Modern collaboration often comes with a heavy price, but there are ways to manage it.