Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The critical risk in DORA financial regulations

Supply chain attacks are a growing concern, particularly within the financial sector, with attackers increasingly using key technology suppliers as a ‘jumpbox’ to pivot into their intended target organisation. Last year’s MOVEit breach for instance saw a single ICT supplier ultimately cause ~2,356 organisations to be compromised, with primary victims predominantly in the financial sector.

Assessing and Prioritizing Risk in Your Infrastructure

There are lots of hurdles to jump when trying to set up and maintain a SIEM. Preparing infrastructure and installing the software components, getting logs ingested into the system, parsing and normalizing those log messages properly, configuring alerts for detection, etc. These are all large tasks that require thoughtful planning and a lot of work to get right. But let’s say you’ve managed to clear all those hurdles…in that case, great job!!

It's Here! The New Nucleus Security User Interface

At Nucleus Security, our goal has always been to deliver an intuitive and scalable vulnerability management platform. A critical part of this mission is ensuring that its user interface (UI) evolves to meet our customers’ needs. I’m pleased to announce that we recently rolled out an updated UI—an important first step in a series of planned improvements aimed at enhancing our users’ experience with the Nucleus platform.

ZTNA vs VPN - Whats the Best Security Solution?

Work from home (WFH) remains a common practice for many businesses worldwide. This working model has enabled companies to hire top talent across borders, boost revenue, and improve employees work-life balance. A new report by Tata Consultancy Services (TCS) claims that, by 2025, 40% of employees around the world will work from home. However, this growing trend also brings about a range of cybersecurity risks that could impact businesses significantly.

Securing QR Codes: Protect Against Cyber Threats

QR codes have become part of daily life, enabling quick access to websites and services with a single scan. However, this convenience also makes them a major target for cybercriminals who exploit their popularity. The hidden nature of QR data can easily redirect users to malicious content or phishing sites without their knowledge. With the growing risks tied to this technology, businesses need to implement more advanced security measures. Simple practices like regularly checking code destinations and verifying source authenticity can help reduce vulnerabilities.

The Importance of Security in a Hybrid Work Environment

As hybrid work models become more and more prevalent among businesses, more are adopting hybrid work environments to maximize flexibility and productivity. Unfortunately, however, this creates unique security challenges which must be managed. One critical aspect of hybrid working environments is ensuring sensitive information remains safe. Since more employees work from various locations than before proper security measures - like secure file cabinet locks - must be put in place to safeguard valuable assets such as files.

How to Use Log Analytics for Insider Threat Detection

In the world of enterprise security, most teams are laser-focused on defending organizational IT assets from external actors: cybercriminals, digital fraudsters, state-backed hackers, and other external adversaries. But data on the frequency and cost of insider attacks suggests that security teams should shift their focus toward threats that originate from inside their organizations.
Featured Post

Is the Speed of AI Development Leaving UK SMEs Struggling to Plug Security Gaps?

Artificial Intelligence (AI) is perhaps one of the fastest evolving technologies in business today. For SMEs, it can be hard to keep up with these developments and sift through what's simply noise, and what will deliver tangible business benefits. As the UK data from our recent SME IT Trends report shows, embracing AI can help UK SMEs streamline operations, improve the admin and user experience, and stand out in a crowded marketplace. Without a doubt, choosing to ignore AI would be choosing to fall behind.

Is Upwork Legit and How To Protect Yourself?

Doing business online has become simpler with the development of the Internet and mobile technologies. In general, both freelancers and clients benefit from the freelancing platforms. Freelancers have benefited from the freedom to choose their own hours and maintain creative control, the capacity to serve various clients. The clients can scale the work from project to project, develop round-the-clock contact, and hire freelancers at a reasonable price.