Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

EP 66 - Post-Election Insights: AI, Misinformation and Security

In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S.

API (In)security: The Hidden Risk of Black Friday

Black Friday may be the pinnacle of the holiday shopping season, a day when online retailers experience unprecedented traffic and revenue opportunities as consumers kick off the Christmas season. For many retailers, it’s a make-or-break event. Yet, with increased traffic comes increased risk, particularly as it relates to cybersecurity and keeping shoppers safe from fraud stemming from a cyberattack on their favorite digital store.

Why you need to augment prevention-only posture with cloud detection and response

In the early days of cloud security, like in the early days of endpoint, the focus was on prevention. This makes sense: preventative measures are an essential way to reduce risk. Blocking known threats and attack paths makes sense as a way to harden an organization’s cloud estate. For many organizations, a prevention-only strategy in the cloud might seem completely sufficient for reducing risk – and it is to an extent. But prevention alone can only go so far.

Nucleus Ranked No. 85 Among Deloitte's 500 Fastest Growing Companies in North America

We’ve had a lot to celebrate at Nucleus this year, with today’s news being the being one of our most significant achievements of the year. Speaking for the whole company, we are proud to have been named to the Deloitte Technology Fast 500, a ranking of the 500 fastest growing technology companies in North America for 2024, and for the recognition of our 1,562% growth over the past three years.

CIO POV: How Modern CIOs Wear (at Least) Seven Different Hats

When the title of chief information officer (CIO) first emerged in the early 1980s, it was very different from what it is today. Technology evolution, emerging threats and new realities have shifted the role from simply “keeping the lights on” to strategically “enabling the business” in every way.

CrowdStrike Strengthens SMB Security with Seamless Mobile Protection

Small and medium-sized businesses (SMBs) face many of the same cybersecurity threats as large enterprises but often lack the resources to maintain robust security across all devices. As SMBs rely on a growing number of smartphones and tablets, they must defend against a range of mobile-focused cyberattacks. The need for comprehensive security has never been more urgent.

RMM vs. Dedicated Patch Management Solution: Which Patching Strategy Is the Best Option for You?

As attacks grow increasingly unpredictable and complex, cybersecurity defense requires much more than a basic strategy; it demands a proactive approach that anticipates the adversary's every move. Many MSPs entrusted with this critical mission by customers must equip themselves with the right technologies that prevent, detect, and respond to potential attacks and adapt as environments and organizational needs change.

Mastering Privileged Account and Session Management: 6 Best Practices to Implement in Your Organization

Cybercriminals will often target an organization’s privileged accounts, which provide a pathway to highly valuable assets. If compromised, privileged accounts and sessions can be used for malicious activity, potentially causing cybersecurity incidents. These incidents may lead to operational disruptions, financial losses, compliance issues, and reputational damage.