Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

New Nightfall Platform Enhancements Makes Parsing and Managing Findings Easier
Blog

New Nightfall Platform Enhancements Makes Parsing and Managing Findings Easier

New Nightfall Platform Enhancements Makes Parsing and Managing Findings Easier

Nightfall customers have always lauded the platform’s ease of use and simplicity, but our team is always hard at work looking for ways to improve user experience. This month, we’ve made multiple features GA across the platform, that will further your ability to further customize what content and files trigger Nightfall detectors as well as the ways you can ingest this data.

November news & updates from Nightfall AI
Newsletter

November news & updates from Nightfall AI

November news & updates from Nightfall AI

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Recent AstraZeneca Breach Illustrates Risk of Credential Leakage Across Cloud Apps
Blog

Recent AstraZeneca Breach Illustrates Risk of Credential Leakage Across Cloud Apps

Recent AstraZeneca Breach Illustrates Risk of Credential Leakage Across Cloud Apps

Yesterday, TechCrunch broke a story about pharmaceutical giant AstraZeneca, which experienced a leak affecting sensitive patient data. We think this incident is worth reviewing to learn more about how data exfiltration risk is distributed across the entirety of an organization’s SaaS infrastructure.

The Essential Guide to Secrets Scanning
Blog

The Essential Guide to Secrets Scanning

The Essential Guide to Secrets Scanning

While API keys are a necessary part of modern software development, they can also be a major security risk. If an attacker is able to steal an API key, they can gain access to the data and resources that key is meant to protect. There are a number of steps you can take to protect your API keys, secrets, and credentials and prevent them from being stolen. One such method that we will cover in depth in this guide is secret scanning.

5 Stages of the Vulnerability Management Process
Blog

5 Stages of the Vulnerability Management Process

5 Stages of the Vulnerability Management Process

The threat landscape in IT is ever-evolving, with new risks arising practically daily. Trying to anticipate the next type of threat can feel a little like playing whack-a-mole. Instead, IT teams are focusing on vulnerability management: reducing the opportunities for hackers and other bad actors to find a weakness in cyber defenses.

SaaS Data Loss Prevention: What is it and Why is it Important?
Blog

SaaS Data Loss Prevention: What is it and Why is it Important?

SaaS Data Loss Prevention: What is it and Why is it Important?

With the rise of cloud-based applications, data loss prevention (DLP) has become an increasingly important part of information security. DLP refers to the policies and technologies used to prevent sensitive data from being lost or stolen. In the context of SaaS, this can include both the security measures implemented by the SaaS provider and the steps taken by the customer to protect their data. In this blog post, we'll provide a more detailed overview of what SaaS DLP is, why it's important, and how you can go about setting up a DLP strategy for your business.

Understanding Sensitive Data Discovery: Classification and Tools
Blog

Understanding Sensitive Data Discovery: Classification and Tools

Understanding Sensitive Data Discovery: Classification and Tools

In its 2022 Cost of a Data Breach report, IBM notes that for 83% of companies, it’s not if a data breach will happen — but when. The sheer volume of data, as well as the difficulty in monitoring shadow IT and the shift to remote work, means that IT security teams face a persistent and ever-changing risk landscape that makes it extremely difficult to keep information secure.

Covered Entities vs Non-Covered Entities Under HIPAA
Blog

Covered Entities vs Non-Covered Entities Under HIPAA

Covered Entities vs Non-Covered Entities Under HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 and sets forth a comprehensive set of standards for protecting sensitive patient health information. The Privacy Rule applies to all entities that fall within the definition of a "covered entity", which generally includes healthcare providers, health plans, and clearinghouses.

What is the FTC Safeguards Rule?
Blog

What is the FTC Safeguards Rule?

What is the FTC Safeguards Rule?

The FTC Safeguards Rule, is a set of regulations promulgated by the Federal Trade Commission in order to protect the privacy of consumers' personal information. The Rule requires financial institutions to develop, implement, and maintain a comprehensive information security program designed to safeguard customer information.

Why Data Loss Prevention strategy is core to successful M&A
Blog

Why Data Loss Prevention strategy is core to successful M&A

Why Data Loss Prevention strategy is core to successful M&A

When two companies merge, there is typically a lot of data that needs to be transferred between the two organizations. This data may include confidential information such as customer records, financial reports, and employee data. If this data falls into the wrong hands, it could be used to commit fraud or theft. That's where data loss prevention (DLP) comes in.

Establish an Efficient DLP Policy With These 5 Best Practices
Blog

Establish an Efficient DLP Policy With These 5 Best Practices

Establish an Efficient DLP Policy With These 5 Best Practices

Strong data loss prevention requires two things: a strong policy that guides user actions and permissions, and the tools to monitor and manage data security. Many organizations know they need to invest in software, platforms, and other security settings to create secure networks, endpoints, and cloud settings. But not every organization has a strong DLP policy to guide these tools.

Your Definitive Guide to Data Security Posture Management (DSPM)
Blog

Your Definitive Guide to Data Security Posture Management (DSPM)

Your Definitive Guide to Data Security Posture Management (DSPM)

With high-profile data breaches making headlines on a regular basis, it's no wonder that data security is top of mind for so many organizations. But what exactly is data security posture management (DSPM)? In this blog post, we'll take a closer look at DSPM and how it can help your business keep its data safe and secure.

How To Create A Cloud Security Policy [+ FREE Template]
Blog

How To Create A Cloud Security Policy [+ FREE Template]

How To Create A Cloud Security Policy [+ FREE Template]

By one estimate, 60% of all corporate data is stored in the cloud. Businesses rely on cloud platforms like Slack, Google Drive, GitHub and Confluence to store data, share information, and run smoothly.

The Importance of Email DLP for Remote Organizations
Blog

The Importance of Email DLP for Remote Organizations

The Importance of Email DLP for Remote Organizations

Email is a popular channel for hackers: phishing attacks and malware usually originate from email. In 2022, Verizon found that 82% of breaches involved the human element: phishing emails and ransomware delivered via email continue to plague organizations of all sizes.

How Does Data Visibility Help With Data Loss Prevention?
Blog

How Does Data Visibility Help With Data Loss Prevention?

How Does Data Visibility Help With Data Loss Prevention?

Data loss prevention starts with data visibility. Without a clear idea of what data an organization has, where it lives, and how it’s used, data loss prevention (DLP) is essentially an exercise in futility.

What Is Cloud DLP And Why Do You Need It For Remote Work?
Blog

What Is Cloud DLP And Why Do You Need It For Remote Work?

What Is Cloud DLP And Why Do You Need It For Remote Work?

Remote work is not going away. Depending on who you ask, experts believe 35% - 65% of the US workforce will continue to work remotely, permanently. Remote work was a trend that began well before the pandemic and will continue to be the preferred way to work for companies and employees alike.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo