Blog

Stay up to date on industry trends, security advice, product news and more.

Protecting Data in the Event of Breach with Zero Trust

Protecting Data in the Event of Breach with Zero Trust

There are ways protect your data in the event of breach. Now is the time to apply a Zero Trust approach to your data access.
How to conduct a GDPR compliance audit

How to conduct a GDPR compliance audit

The purpose of undergoing a GDPR compliance audit is to determine if a company that deals with data has put in place adequate policies and measures that would regulate how personal data are being processed. Learn more about the benefits of GDPR compliance audit in our blog post.
A Message from archTIS’s CEO on the Acquisition of Nucleus Cyber

A Message from archTIS’s CEO on the Acquisition of Nucleus Cyber

Discover what this exciting merger means for our customer, prospects and partners.
archTIS Closes Merger with Nucleus Cyber to Accelerate Growth in 2021

archTIS Closes Merger with Nucleus Cyber to Accelerate Growth in 2021

Nucleus Cyber was acquired by archTIS (ASX:AR9), an Australian software provider specializing in secure information sharing and collaboration.
3 Access and Security Plays to Mitigate the Damage of a Solar Winds Style Cyberattack

3 Access and Security Plays to Mitigate the Damage of a Solar Winds Style Cyberattack

We’ve assembled some access and security tips to better protect your organization and the primary target - your data - from a cyberattack.
Join Nucleus Cyber’s Growing Global Channel Program

Join Nucleus Cyber’s Growing Global Channel Program

The Nucleus Cyber channel program ecosystem now includes over 25 partners around so customers can get local support for NC Protect anywhere. Learn more about the program.
Collaboration Tools Have Powered 2020: 6 Tips to Keep Them Secure

Collaboration Tools Have Powered 2020: 6 Tips to Keep Them Secure

Collaboration tools have powered work and life in 2020 – Here’s 6 tips to keep them secure without slowing down collaboration.
3 Challenges of Managing SharePoint Access and Security

3 Challenges of Managing SharePoint Access and Security

Discover a new model for managing SharePoint access and security that enables collaboration without compromising security.
3 File Share Security Flaws Putting Sensitive Data at Risk

3 File Share Security Flaws Putting Sensitive Data at Risk

Discover why traditional approaches to file share security are no match for modern security threats and what to do about it.
Understanding and Assessing GDPR Compliance Risks

Understanding and Assessing GDPR Compliance Risks

GDPR compliance is a complicated process that involves a lot of areas, mostly connected with data security and privacy. There’s also a lot of compliance-related risks that should be given priority when working on your compliance to GDPR. Find out more in this article.
Secure Collaboration, Is That Possible?

Secure Collaboration, Is That Possible?

We dig into the challenges of secure collaboration with the shift to remote work, proliferation of collaboration channels, and growing insider threats.
9 Ways Data Vampires Are Bleeding Your Sensitive Information

9 Ways Data Vampires Are Bleeding Your Sensitive Information

Beware! The mass conversion to remote work and adoption of new collaboration tools leave sensitive information at risk from data vampires.
NC Protect Named Data Security Innovation of the Year

NC Protect Named Data Security Innovation of the Year

Nucleus Cyber’s NC Protect received the 2020 CyberSecurity Breakthrough Award for Data Security Innovation of the Year.
Why Email is the Biggest Security Vulnerability of All

Why Email is the Biggest Security Vulnerability of All

Why email, arguably the most commonly used collaboration tool, poses biggest data security threat from your insiders, plus email data loss prevention tips.
Five Risky Misconceptions About Intellectual Property Theft

Five Risky Misconceptions About Intellectual Property Theft

IP theft can have dire consequences to the survival of your company. Despite this knowledge, there are five serious misconceptions about Intellectual Property Theft that are putting your organization at risk.
Nucleus Cyber is Now Microsoft IP Co-sell Ready!

Nucleus Cyber is Now Microsoft IP Co-sell Ready!

As a IP Co-sell Ready Microsoft partner, our NC Protect solution will be jointly sold with Microsoft sales teams and in Microsoft’s commercial marketplace so it is more readily available through the Microsoft sales and partner ecosystems.
How to identify and protect personal information

How to identify and protect personal information

Handling a person’s personal information is a delicate and daunting task. Learn how to identify and protect personal information.
Data Classification Policy: Examples and Templates

Data Classification Policy: Examples and Templates

Data classification policy is an essential part of any company’s security system, defining the proper protection measures and the risks associated with exposing the data in question. Learn more about data classification policies in this article.