Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

What's On the Horizon for AI Risk Management

Sam Altman’s recently published “Reflections” blog is one of those pieces that made me stop mid-scroll and wonder, “We’re really right in it, aren’t we?” Part think piece, part reality check, it’s a fascinating article that balances enthusiasm for AI’s potential with the very real warning signs flashing over all our heads.

DNS Servers & Cybersecurity: How They Work and How to Secure Them

The Domain Name System (DNS) is a fundamental component of the Internet, translating human-friendly domain names into IP addresses that computers use to communicate. While its primary function is straightforward, DNS servers play a crucial role in both the performance and security of online activities.

Where the Shadows Lie

Shadow technology, regardless of name, is a manifestation of the same issue - unmonitored, unauthorized, or hidden technology operating outside official oversight. Over the past ten years, with the adoption of SaaS services, Shadow IT became a significant concern for security teams. With the more recent explosion of AI tools, we’ve started to hear the term Shadow AI being used for the same reasons.

From Zero to CTEM: An Actionable Approach to the Five Stages

Join Nucleus team members Tali Netzer, Head of Product Marketing, and Scott Koffer, COO and Co-Founder, as they navigate the intricacies of Continuous Threat Exposure Management (CTEM). In this webinar, they discuss the history of vulnerability management, the evolution to CTEM, and how it fundamentally changes the approach to cybersecurity. Learn about the five-step CTEM process, from scoping and prioritization to validation and mobilization.

Security Without Tears: Making Threat Intelligence Actionable - Fireside Chat

Dr. Kane Tomlin, CIO at Mississippi State Department of Health shares his innovative ‘Security Without Tears’ approach. Learn how he reduces complexity, prioritizes threats, and implements practical, citizen-focused security solutions at MSDH.

Automating Data Privacy Confidence with a PIA

A Privacy Impact Assessment (PIA) is a process that helps identify and manage any privacy risks that may arise from taking on new projects or systems that involve personally identifiable information (PII). PIAs are recommended by the EU’s General Data Protection Regulation (GDPR) and required for government agencies to perform under the U.S. E-Government Act.

Cybersecurity Performance Management and Measuring Cyber Risk Exposure

Cybersecurity performance management (CPM) is the process of continually assessing and optimizing an organization's security posture. As cyber threats evolve, organizations must ensure their security measures are withstanding this increasing sophistication of ensuing attacks. However, with this rapid rate of change, traditional approaches to cybersecurity performance measurement, which often rely on static technical metrics, are failing to capture the broader business impact of cyber risks.