Blog
Stay up to date on industry trends, security advice, product news and more.

Nucleus Cyber Named a Most Trusted Microsoft Technology Partner by CIO Techie
Nucleus Cyber Named a Most Trusted Microsoft Technology Partner in CIO Techie for Providing Data-Centric Security for Secure Collaboration

As Seen in Dark Reading: 9 Ways Data Vampires Are Bleeding Your Sensitive Information
This post by Nucleus Cyber's Steven Marsh originally appear in Dark Reading

5 Things from Microsoft Ignite that Excite
It’s Microsoft Ignite! Over 25,000 attendees descended on Orlando this week to hear about Microsoft’s latest and ...

When Pillow Talk Risks National Security – Preventing Malicious Insider Threats
This isn’t a story from a late-night TV thriller or spy novel. It’s the real story of how Henry Frese allegedly stole government secrets from early to mid-2018 until his arrest earlier this month. It’s a nightmare scenario that can happen to any company or agency without proper controls in place.

Proactive vs. Reactive Security – How to Prevent Not Just Detect Insider Threats
How to prevent an insider threat from occurring in the first place versus trying to assess if a user’s behavior is suspect after the damage is done.

NC Protect Now on Microsoft Azure Marketplace
Azure customers can now benefit from our tight integration with Microsoft AIP providing fine-grained, data-centric security to expand protection and control over all of their Microsoft collaboration and enterprise social data.

NC Protect Named Access Management Solution of the Year
Nucleus Cyber is proud to announce we received the 2019 CyberSecurity Breakthrough Award for Access Management Solution of the Year.

As seen in VM Blog: Sharing Data Inside and Outside of the (Drop)Box
3 reasons why Cloud based collaboration tools, like Dropbox, are the best and worst thing to happen to business collaboration and 4 ways to protect shared data.

Secure Collaboration – The Impossible Paradox
Despite best efforts, the security solutions in use today are only partially effective at protecting sensitive data. A new approach is clearly needed. First, we must understand the impact of modern collaboration demands on information security, as we explore a more effective method to secure collaboration.

National Insider Threat Awareness Month – Resources for Detection and Prevention
September is National Insider Threat Awareness Month! Every organization should take this opportunity to educate themselves on on the importance of safeguarding against insider threats and best practices for mitigating those risks. Check out these resources for Awareness, Detection and Prevention.

Preventing Trade Secret Theft: Examining the Anthony Levandowski Case
Anthony Levandowski's trade secret theft indictment highlights the importance of balancing data protection needs of organizations and employees.

ZD Net: Hybrid cloud serves as bridge to our bright all-cloud future
This is an excerpt from an article featuring an interview with Nucleus Cyber's Steven Marsh that originally appeared in ZD Net

User Training Alone is Not Enough to Prevent Insider Threats
A recent report from Cybersecurity Insiders looked at what companies believe are the drivers for insider attacks. The top answer - lack of user training. The solution to the problem most cited - more user training. However, more training alone isn’t the answer – training backed by automated enforcement is.

Nucleus Cyber Joins Microsoft Intelligent Security Association to Protect Customers Against Cybersecurity Threats with Tight Technology Integrations
Nucleus Cyber joins the Microsoft Intelligent Security Association

Executives are often overlooked as security risks
We all know to secure personal information like personally identifiable information (PII), protected healthcare ...

Survey Reveals Damaging Insider Threats Rose to New Highs in the Last 12 Months
Today’s most damaging security threats do not always originate from malicious outsiders or malware as you might ...

APRA CPS 234 Information Security Guidance
The Australian Prudential Regulation Authority has created a new prudential standard for information security management APRA CPS 234. Ensure your data security practices comply.

NC Protect Deepens Integration with Microsoft utilizing MIP labels, Enhancing Access and Data Protection Controls
Today at Microsoft Inspire in Las Vegas we announced that NC Protect now utilizes Microsoft Information Protection (MIP) labels to enhance conditional access and data security controls in Microsoft platforms to guard against insider threats, sensitive data misuse, unauthorized sharing and exfiltration.