Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why This Moment Matters: Announcing our Series C Funding

Today, we announced our Series C funding. I want to start by saying thank you to Delta-v Capital and Arthur Ventures for their partnership and conviction in what we’re building. We’re grateful for their support and for the trust they’ve placed in our team. They didn’t invest because Nucleus tells a good story.

DDI Central 6.1: Now with Windows credentials management, Windows bulk server import, RBAC for subnets and hosts, improved cluster dashboard, and more

With the release of DDI Central 5.6, we brought in some of the major features—anomaly detection, DNS query and DHCP lease forecasting, record monitoring, zone versioning and Cisco DHCP integration—all to help you seamlessly and securely manage your organization's network operations. Now, DDI Central has come up with new enhancements and facilities with the new release DDI Central 6.1 this year.

Reach Security Announces Breakout Year Marked by Major Growth, Market Momentum, and Expanded Leadership Team

Reach Security announces a standout year of growth and innovation in 2025, and enters 2026 with significant momentum. The company's enhanced leadership team and growing customer base mean Reach is well-positioned to advance its next phase of market-leading innovation in pre-emptive cybersecurity.

Introducing Aikido Expansion Packs: Safer defaults inside the IDE

Developers work in a few core loops: writing code, committing changes, installing dependencies, and increasingly working alongside AI in the editor. Aikido Expansion Packs are built around those moments. They let you add focused security capabilities to Aikido that run locally, inside your IDE, and fit naturally into how developers already work. Each pack addresses a specific part of the workflow and does not require new tools, new pipelines, or new processes.

Veracode Named a Leader in GigaOm Radar for Software Supply Chain Security

Modern software development is a balancing act. You are under constant pressure to innovate faster, ship features daily, and maintain near-perfect uptime. To meet these demands, development teams rely heavily on open-source libraries, APIs, and third-party components. It’s efficient, but it introduces a significant challenge: your attack surface is now composed of code you didn’t write. Securing this complex web of dependencies—your software supply chain—is no longer optional.

BDRShield v9.0.0 Now Available: Cloud-Managed VM Backups and Server Proxy for Distributed Environments

We are excited to announce the release of BDRShield v9.0.0, a milestone update that fundamentally changes how organizations manage virtualized, distributed, and multi-geo backup environments from the BDRShield Cloud management...

CrowdStrike Is the Only Vendor to Be Named a Customers' Choice in 2025 Gartner Voice of the Customer for External Attack Surface Management

External attack surfaces are expanding faster than most organizations can track. Internet-facing cloud services, network devices, commercial AI tools, and third-party infrastructure are driving the growth of unintended exposure outside security teams’ control.