Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Understanding the GLBA Safeguards Rule
Blog

Understanding the GLBA Safeguards Rule

Understanding the GLBA Safeguards Rule

The Gramm-Leach-Bliley Act (GLBA) aims to protect consumer financial privacy with three provisions: the Financial Privacy Rule, the Safeguards Rule, and the Pretexting Provisions.

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC
Announcement

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

We’re pleased to announce that Nightfall has joined Snyk’s Technology Alliance Partner Program (TAPP). Nightfall will sit alongside partners like RedHat, and Hashicorp to provide critical DevSecOps functionality to developers.

How to Test for PCI Compliance
Blog

How to Test for PCI Compliance

How to Test for PCI Compliance

PCI compliance is a complicated matter. There are a number of different steps to meet and validate your achievement of the PCI DSS standard. In this guide, we’ll break down the steps in PCI compliance testing, the different types of PCI compliance tests, and how much it costs to complete this process.

What are PCI Security Standards?
Blog

What are PCI Security Standards?

What are PCI Security Standards?

PCI DSS stands for Payment Card Industry Data Security Standard. This standard is set forth by the PCI Security Standards Council, an organization founded in 2006 by American Express, Discover, JCB International, Mastercard and Visa Inc.

PCI Compliance for Small Business
Blog

PCI Compliance for Small Business

PCI Compliance for Small Business

PCI compliance applies to businesses of all sizes: In fact, the PCI Council sets compliance standards according to how many card-based transactions a business handles each year.

Network Segmentation: What Is It and How Does It Affect PCI Scope?
Blog

Network Segmentation: What Is It and How Does It Affect PCI Scope?

Network Segmentation: What Is It and How Does It Affect PCI Scope?

Network segmentation is a practice that can dramatically lower the time, effort and cost of a PCI DSS assessment. Not only is it an industry best practice for security cardholder data, but it’s also an effective way of controlling the annual commitment of meeting your PCI compliance requirements.

Announcing Our Next Cloud-native Integration: Nightfall for Salesforce Enters Active Development
Announcement

Announcing Our Next Cloud-native Integration: Nightfall for Salesforce Enters Active Development

Announcing Our Next Cloud-native Integration: Nightfall for Salesforce Enters Active Development

At Nightfall, our mission is to discover and secure sensitive data in every cloud application through a cloud-native, accurate, and performant platform. Since 2019, Nightfall has partnered with some of the world’s most innovative organizations to proactively eliminate data security risks across a fleet of SaaS applications via our native integrations for Slack, Atlassian Jira, Confluence, Google Drive, and GitHub.

Understanding The HIPAA Breach Notification Rule
Blog

Understanding The HIPAA Breach Notification Rule

Understanding The HIPAA Breach Notification Rule

Some PHI breaches, however, are out of the organization’s control. Determined hackers can expose PHI, and employees can make mistakes — they’re only human, Despite training, rigorous security protocols, and constant monitoring, data breaches can happen.

5 Most Common HIPAA Violations and Their Penalties
Blog

5 Most Common HIPAA Violations and Their Penalties

5 Most Common HIPAA Violations and Their Penalties

Those who work in the healthcare industry know: HIPAA compliance is often fiercely enforced by the Department of Health and Human Services, and penalties can be steep.

HIPAA Compliance Checklist: A Quick Guide
Blog

HIPAA Compliance Checklist: A Quick Guide

HIPAA Compliance Checklist: A Quick Guide

HIPAA compliance requires covered entities and business associates to secure protected health information. Social Security numbers, medical record numbers, health plan beneficiary numbers, account numbers, and names of patients, relatives, or employers all must be secured from unauthorized access.

What Are Covered Entities Under HIPAA?
Blog

What Are Covered Entities Under HIPAA?

What Are Covered Entities Under HIPAA?

HIPAA’s regulations refer to two parties: a covered entity and a business associate. These groups are required to achieve PHI compliance. Specifically, this means these groups are liable for protecting the confidentiality, integrity, and availability of personal health information.

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users
Newsletter

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

How to Set Up Fluent Bit and the Nightfall Filter Plugin
Engineering

How to Set Up Fluent Bit and the Nightfall Filter Plugin

How to Set Up Fluent Bit and the Nightfall Filter Plugin

Sensitive data often makes its way into logs. Though most of the time unintentional, these incidents have the potential to do a lot of damage, as they usually involve exposure of API keys, passwords, and customer data that can give attackers access to critical business data or put companies at compliance risk

How AI & Machine Learning Powers Next-Gen Data Leak Prevention (DLP)
Engineering

How AI & Machine Learning Powers Next-Gen Data Leak Prevention (DLP)

How AI & Machine Learning Powers Next-Gen Data Leak Prevention (DLP)

The current wave of digital transformation that has brought more and more businesses online has also introduced an unwelcome side effect: the surface area for attacks has ballooned.

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule
Blog

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule

The Gramm-Leach-Bliley Act, known as the GLBA, was passed in 1999 under President Clinton. The goal of the GLBA was to update and modernize the financial industry. Today, it’s primarily used to protect customer and consumer information, with steep penalties for financial institutions that violate its privacy rules. Here’s what you need to know about the GLBA and its regulations.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo