Zero Trust is one of the latest buzzwords in cybersecurity. However, it is one of the efficient tools to deal with today’s sophisticated threats. Zero trust is a security...
In a Pass-the-Hash or PtH attack, a threat actor steals a password and without decoding it, reuses it to manipulate an authentication system into creating a new authenticated session...
A feature of Active Directory (AD) domain controllers, the global catalog allows a domain controller to provide detailed information on all the objects in the forest, independent of whether...
Due to ever increasing need for online communication, email has been a major security issue or vulnerability. In fact, antivirus software is not efficient in blocking the social engineering...
Through a joint venture between the National Counterintelligence and Security Center (NSC) and the National Insider Threat Task Force (NITTF), September has been declared National Insider Threat Awareness Month...
This year has been a year like no other, with a never-ending series of events. We have seen the evolution of the Coronavirus pandemic at a glance, the continuing...
Digital Transformation—what is it? The description of the Wiki is very straight forward: “Digital Transformation is the adoption of digital technology to transform services or businesses, through replacing non-digital...
Microsoft Teams is everywhere in 2020. Adoption was growing before the pandemic, and the surge of remote workers sent usage into overdrive. However, a by-product of accelerated growth is...
Valued customers and partners, I am pleased to announce Nucleus Cyber has achieved Microsoft IP Co-sell Ready status. As an IP Co-sell Ready Microsoft partner, our NC Protect solution...
A Security Threat Hiding in Plain Sight There’s been a lot of buzz around remote work and securing enterprise collaboration tools like Microsoft Teams and SharePoint from data loss,...