Executives are often overlooked as security risks
We all know to secure personal information like personally identifiable information (PII), protected healthcare ...
Survey Reveals Damaging Insider Threats Rose to New Highs in the Last 12 Months
Today’s most damaging security threats do not always originate from malicious outsiders or malware as you might ...
APRA CPS 234 Information Security Guidance
The Australian Prudential Regulation Authority has created a new prudential standard for information security management APRA CPS 234. Ensure your data security practices comply.
NC Protect Deepens Integration with Microsoft utilizing MIP labels, Enhancing Access and Data Protection Controls
Today at Microsoft Inspire in Las Vegas we announced that NC Protect now utilizes Microsoft Information Protection (MIP) labels to enhance conditional access and data security controls in Microsoft platforms to guard against insider threats, sensitive data misuse, unauthorized sharing and exfiltration.
GDPR Fines Just Got Real – Record Fine for British Airways Data Breach
Anyone under the impression that GDPR enforcement would be eased into the market got a huge wake-up call this week. 3 takeaways every company needs to learn in the wake of this $230M fine.
As seen in CDM: Enterprise Social Collaboration: Security Friend or Foe?
This is an excerpt of an article published in Cyber Defense Magazine (CDM) on July 1, 2019 by Dr. Steve Marsh, Vice President of Product for Nucleus Cyber
Mitigate Dropbox Data Breach Risks
While Dropbox has security capabilities, sensitive information is still at risk from accidental sharing and misconfigured settings caused by human error. To address these risks, NC Protect now supports identification, conditional access and protection of sensitive information in Dropbox and Dropbox Business.
Defining Sensitive Data to Protect Your Organization’s Critical Assets
What information are we referring to when we use the term sensitive data? Why defining it too narrowly can put important data at risk.
6 Steps to Shed Light on Dark Data and Mitigate Risk
Is Dark Data Putting You at Risk? With modern collaboration apps, users can create and access data from an ...
New Conditional Access and Security Capabilities for Teams and Yammer
NC Protect Extends Data Protection Capabilities to Microsoft Teams and Yammer Companies have embraced social ...
Breaches Highlight Why Password Protecting Systems Alone Falls Short
Several recent high profile breaches had a common single point of failure – location based security. Why the belt and suspenders approach of data-centric security is necessary to properly protect sensitive data.
Microsoft AIP Validates the Data-Centric Security Approach
Earlier this year Microsoft made an announcement that marked a significant in shift their approach to best protect sensitive data with Azure Information Protection (AIP). The announcement validates that now is the time for enterprises to embrace data-centric security solutions in the fight to protect data.
Webinar on How to Balance Collaboration with Data Security
How to Protect Sensitive Data During CollaborationToday’s collaboration and file sharing tools require ...
Re-evaluating Data Security Practices as Healthcare Breaches Reach a Record High
Data security is a challenge facing every organization today. Healthcare in particular is highly susceptible due to
Meet Two More Insiders Putting Your Data Security at Risk
We uncover two more insiders in every organization who are inadvertently (and some deliberately) putting your organization at risk and how data-centric security can help stop them in their tracks.
Identifying The Top Insider Threats to Data Security: The Anonymous Admin
Discover the insiders found in every organization who are inadvertently (and some deliberately) putting your organization at risk bypassing governance and training, misusing privileges, stealing IP, sharing confidential data with unauthorized parties, and making innocent mistakes.
Box Data Leaks – Location-Based Security Failure Impacts 90 Companies
Sensitive corporate and customer data from 90 companies, including Apple, Box and Discovery Network, exposed on Box underscores the need for more mature, data-centric security. A look at what happened and 4 tips for a adopting a data-centric strategy.
Controlling Data Misuse in an Age of Digital Collaboration
Ever receive an email with confidential information not meant for you? Just like that you’re part of a data breach. Modern collaboration often comes with a heavy price, but there are ways to manage it.