Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

What is PII? Guide To Personally Identifiable Information
Blog

What is PII? Guide To Personally Identifiable Information

What is PII? Guide To Personally Identifiable Information

“PII” stands for personally identifiable information. Hackers often target personally identifiable information for a variety of reasons: to steal a customer’s identity, take over an account, launch a phishing attack, or damage an organization. As a result, there is a multitude of regulations concerning PII protection.

Dissecting Supply Chain Attacks: A Report on a Growing Sensitive Data Exposure Vector
Guides

Dissecting Supply Chain Attacks: A Report on a Growing Sensitive Data Exposure Vector

Dissecting Supply Chain Attacks: A Report on a Growing Sensitive Data Exposure Vector

Third-party risk has always been a concern for organizations, but since COVID and the rise of remote work, we’ve seen a dramatic acceleration in campaigns leveraging software supply chain attacks. Not just through open source vulnerabilities, but through closed source applications and services as well

ICYMI: How to Ensure Continuous Data Security & Compliance across your SaaS Apps
Blog

ICYMI: How to Ensure Continuous Data Security & Compliance across your SaaS Apps

ICYMI: How to Ensure Continuous Data Security & Compliance across your SaaS Apps

We recently hosted a live discussion covering emerging trends within the cloud security space, primarily reflecting on how organizations could adopt a posture of continuous security and compliance across their SaaS applications. Continue on below to view the highlights from this discussion.

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms
Newsletter

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

The Importance of Continuous Security & Compliance in SaaS Environments
Blog

The Importance of Continuous Security & Compliance in SaaS Environments

The Importance of Continuous Security & Compliance in SaaS Environments

We're living in the era of "giga-breach," where cloud data breaches can easily expose in excess of one billion records. As such, the stakes couldn't be higher for cloud security teams seeking to secure cloud environments. That's why it's important to understand the key vectors driving data breaches today. Read on to learn more.

How Should Startups Build Their Tech Stack?
Guides

How Should Startups Build Their Tech Stack?

How Should Startups Build Their Tech Stack?

At the beginning of every startup's journey, the question plaguing every technical founder and their team is how to build their tech stack. A lot of thought must go into this question because it informs how the startup will adapt to the demands of business growth and any necessary adjustments or pivots of the business.

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms
Announcement

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms

We’re excited to announce Nightfall’s partnership with Cribl, the high scale, data processing and observability platform.

What is ePHI? A Guide to electronic Protected Health Information (ePHI)
Blog

What is ePHI? A Guide to electronic Protected Health Information (ePHI)

What is ePHI? A Guide to electronic Protected Health Information (ePHI)

ePHI stands for electronic protected health information. Electronic protected health information is protected under the Health Insurance Portability and Accountability Act of 1996, commonly known as HIPAA.

What is the HIPAA Security Rule?
Blog

What is the HIPAA Security Rule?

What is the HIPAA Security Rule?

Title II of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) has two key provisions: the Privacy Rule and the HIPAA Security Rule.

Two Concerning Security Trends Highlighted by Recent Breaches
Blog

Two Concerning Security Trends Highlighted by Recent Breaches

Two Concerning Security Trends Highlighted by Recent Breaches

While these two trends—the emergence of misconfigurations and supply chain attacks—exist as separate concerns, breaches this year have illustrated how these trends are converging and how threat actors are taking advantage of both.

Addressing 3 Critical E-discovery Challenges Upstream through Data Governance
Blog

Addressing 3 Critical E-discovery Challenges Upstream through Data Governance

Addressing 3 Critical E-discovery Challenges Upstream through Data Governance

Today, for enterprises and even SMB companies, IT is a sprawling but interconnected universe of applications, devices, and services all running in tandem to maintain the lifeblood of these organizations—data.

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC
Newsletter

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

GitHub Supply Chain Attacks Highlight the Urgency of Zero Trust SaaS Data Security
Guides

GitHub Supply Chain Attacks Highlight the Urgency of Zero Trust SaaS Data Security

GitHub Supply Chain Attacks Highlight the Urgency of Zero Trust SaaS Data Security

In early April, the tech industry witnessed a major GitHub security incident targeting GitHub organizations using Heroku and Travis CI. GitHub was made aware of this threat via an attack leveraging AWS API keys to GitHub’s own npm production infrastructure.

A Quick Guide To Information Security Programs
Blog

A Quick Guide To Information Security Programs

A Quick Guide To Information Security Programs

Broadly speaking, an information security program is a set of activities and initiatives that support a company’s information technology while protecting the security of business data and enabling the company to accomplish its business objectives. An information security program safeguards the proprietary information of the business and its customers.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo