Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identifying Compromised Credentials with Identity Intelligence

Every day, stolen credentials are bought, sold, and exploited on the dark web, fueling account takeovers, data breaches, and financial fraud. Organizations must act fast to stop these threats before they escalate. Yet, traditional security tools struggle to detect compromised credentials before it’s too late. According to Bitsight’s upcoming State of the Underground 2025 report, leaked credentials surged by 24% and logs listed on underground markets rose by 13.2% in 2024 alone.

Supporting CTEM Scoping with Exposure Assessment Platforms

In our recent article on Continuous Threat Exposure Management (CTEM), we highlighted how exposure assessment platforms (EAPs) like Nucleus can support several critical phases of the CTEM framework. In that article, we intentionally separated the scoping step from the other technology-dependent CTEM stages. Scoping begins as a business- and process-driven exercise. However, doing scoping well and at scale relies more on having the right technology.

Achieving Continuous Exposure Management in Cloud-Native Environments

In this webinar, "Achieving Continuous Exposure Management in Cloud-Native Environments," Tally Netzer and Aaron Unterberger from Nucleus dive deep into how modern cloud architectures impact vulnerability and exposure management. You'll learn: Why traditional vulnerability management falls short in cloud-native, ephemeral environments. How fragmented visibility and unclear ownership disrupt effective security practices.

What's new in Riscosity: March 2025

Riscosity has made it even easier to prioritize issues where data types are being shared by your Applications with 3rd party vendors by adding Confidence Scores to those data types. Users can focus in on the issues with data types that Riscosity had the highest confidence in determining without worrying about false positives.

Report Writing Solved: Generating Actionable Assessment Reports

If you’re a security analyst, you know the work never stops. Even after your team completes an extensive vendor risk assessment and remediation, you still need to write a report to share your findings with key stakeholders. And this work isn’t a walk in the park by any means. Writing a risk assessment report often requires hours (or even days) of summarizing information, repopulating graphs, and balancing technical details with clarity to cater to technical and non-technical stakeholders.

Security Bottleneck? Here's How to Accelerate Vendor Approvals

Organizations today move fast, but slow vendor approvals can grind everything to a halt. As companies increasingly rely on third-party vendors, slow vendor approvals create a serious security bottleneck. This slowdown costs organizations valuable time and resources—and leaves them open to security risks. It’s important to cohesively review and approve vendors to manage third-party risk, but organizations should be aware of just how long those approvals take.

Why managed security services are now a business imperative

Many organizations are discovering that managing cybersecurity in-house is not only costly but also becoming increasingly ineffective and in some case extremely risky for the business. With cyberattacks growing in sophistication and scale all the time, traditional, in-house IT teams can struggle to keep pace with threats, compliance obligations and operational demands. This is where managed security services come in.

The European Supply Chain Battlefield: Cybersecurity, National Defense, and the NIS2 Directive

In an increasingly interconnected digital world, supply chain security has become a critical concern for European organizations, policymakers, and national defense agencies alike. With adversaries exploiting software dependencies, contractors, and managed service providers (MSPs), the cybersecurity risks embedded within supply chains have never been more significant.

Top 5 Cyber Threats CultureAI Detected in Q1 2025

Cyber security threats continue to evolve, but one factor remains consistent: human error is still the greatest risk to modern businesses worldwide. Employees make mistakes, bypass security measures, and fall victim to sophisticated social engineering attacks, leading to devastating data breaches. Despite extensive security awareness training, the reality is that investing more time and money in training isn’t solving the problem.