Blog

Home/Blog/

Carnival, J. Crew and T-Mobile Data Breaches due to third party risk

What do the breaches of Carnival, J. Crew and T-Mobile have in common? All three hacks were related to third party breaches and the hackers went after data. The separate incidents show how Companies in different sectors are being targeted to steal and monetize data. These hacks aren’t complex. In fact, it’s the lowest hanging fruits that can have [...]

Carnival, J. Crew and T-Mobile Data Breaches due to third party risk2020-11-10T09:57:04-05:00

Data Breach resulting in information leaks of 10.6 Million guests by the MGM Grand

The incident—revealed in a published report on ZDNet revealed that the details of more than 10.6 million guests who stayed at MGM Resorts were published on a hacking forum due to unauthorized access to a cloud server. Celebrities, tech CEOs, reporters and government officials were some of the victims in this breach. Some of the personal details found on [...]

Data Breach resulting in information leaks of 10.6 Million guests by the MGM Grand2020-11-10T09:57:50-05:00

Take the Nucleaus Challenge and see if you can answer these questions

As the World turns to code, the threat landscape increases and cyber security management becomes more complex. Code is created and distributed amongst different teams within the organization and key elements that indicate the health of code is not easily identified. Developers, CISOs, security committees, executives and boards of directors are struggling to come up with meaningful information to [...]

Take the Nucleaus Challenge and see if you can answer these questions2020-11-10T09:57:58-05:00

Major developments occurring inside Nucleaus

We have two major developments occurring that includes a new UI design for our console featuring light and dark modes and a better user experience. Couple this with newly architected backend that was developed to support moving to the new UI version of the Console. This new architecture will enhance speed, allow high scalability and support Roles Based Access [...]

Major developments occurring inside Nucleaus2020-11-10T09:58:12-05:00

Continuously monitor code repositories and reports back code vulnerabilities with Nucleaus

As the World goes through the Digital Transformation, your city, car, house, bank, business and hospital are all susceptible to being hacked. Nucleaus enables companies of all sizes to continuously monitor code repositories and reports back code vulnerabilities and project dependencies within the early stages of the development cycle. Whether you're a single developer or collaborating with a team, [...]

Continuously monitor code repositories and reports back code vulnerabilities with Nucleaus2020-11-10T09:58:29-05:00

What are some of the risks when deploying Nucleaus?

With Nucleaus, our ethos is around democratizing application security. As such, we removed all of the risk in deploying Nucleaus and enable teams to be up and running in minutes - not months. By removing all barriers to entry which includes price, technology, maintenance, and operational support, we made our platform as easy as running a spell check. Nucleaus [...]

What are some of the risks when deploying Nucleaus?2020-11-10T09:58:44-05:00

Is source code scanning required for PCI Compliance?

Let's start with the basics...What is PCI and why is it important? The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle credit cards. The standard was created to increase controls around cardholder data to reduce fraud. Validation of compliance is performed annually or quarterly. It is a PCI DSS requirement [...]

Is source code scanning required for PCI Compliance?2020-11-10T09:59:04-05:00

Hold my Beer and Scan this! Why it is important in the new norm?

Every aspect of our lives involves computers and the code that runs them so what does Democratizing application code scanning mean, why is it important, and what does it have to do with beer? Before we jump into the beer conversation, let’s discuss application security and the need to simplify the entire process for application code scanning. We developed [...]

Hold my Beer and Scan this! Why it is important in the new norm?2020-11-10T09:59:31-05:00

What is OWASP Top10?

OWASP, an international non-profit organization dedicated to web application security, stands for Open Web Application Security Project. OWASP is an open community dedicated to enabling the organization to develop, purchase and maintain application and APIs that can be trusted. One of its core principals is that all of their materials be freely available and easily accessible on their website. [...]

What is OWASP Top10?2020-11-10T09:59:43-05:00

Code Scanning Poem

The Nucleaus team isn't just creative at writing code, we can write poems too! Last week, we challenged our team to a poem-hackathon where we asked them to come up with a poem about code scanning. The winner of that challenged received a gift card :) Nucleaus™ scans all the code Searching for vulnerabilities Yes, it finds all those [...]

Code Scanning Poem2020-11-10T10:00:03-05:00
Go to Top