Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams’ Efficiency
Announcement

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams’ Efficiency

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams’ Efficiency

Our team has been hard at work with continuous updates to improve and streamline the Nightfall DLP platform. We wanted to share with you the latest platform updates guaranteed to improve the speed at which security administrators and teams will be able to remediate incidents.

What is a Cyber Security Playbook and How Can it Benefit Your Security Program?
Blog

What is a Cyber Security Playbook and How Can it Benefit Your Security Program?

What is a Cyber Security Playbook and How Can it Benefit Your Security Program?

You probably don’t need anyone to tell you that, today, infosec and cybersecurity are challenging and fast-paced endeavors. In the last five years alone, we’ve seen a myriad of industry altering developments — from an ever expanding universe of privacy compliance legislation and the permanent entrenchment of hybrid and remote work, to growth in the size and scope of data breaches — the world of security has proven ever complex and ever-shifting.

Best Go Regex Library
Engineering

Best Go Regex Library

Best Go Regex Library

At Nightfall, our mission is to detect sensitive data. Today, we detect 50+ types of sensitive data, including social security numbers, API keys, street addresses, and more.

How does sensitive information end up in observability platforms?
Engineering

How does sensitive information end up in observability platforms?

How does sensitive information end up in observability platforms?

Observability (logs, traces, metrics) is a core tenet to building strong software systems. Logs are used to debug issues and check on system activity, traces provide valuable insights into system performance and architecture, and metrics allow engineering teams to closely track business metrics within their systems.

NIST vs ISO Compliance: What's the Difference?
Blog

NIST vs ISO Compliance: What's the Difference?

NIST vs ISO Compliance: What's the Difference?

As businesses and health organizations seek to strengthen cybersecurity, they’re turning frequently to compliance frameworks to help prioritize, guide, and improve decision-making and implementation. Two of the more popular compliance frameworks are the NIST CSF and the ISO 27001.

What is Data Exfiltration?
Blog

What is Data Exfiltration?

What is Data Exfiltration?

Data exfiltration, quite simply, is the risk of your data ending up somewhere it doesn’t belong. Though this definition might seem simple, understanding this risk is quite complicated — especially as companies migrate their data into the cloud. Companies that work remotely using cloud platforms like Google Drive, AWS, or Jira often struggle to maintain the visibility needed to ensure their data remains secure. This increases the risk of data exfiltration, which can often go undetected for weeks, if not longer.

What is Unstructured Data?
Blog

What is Unstructured Data?

What is Unstructured Data?

Unstructured data is data that cannot be processed and analyzed using conventional data tools and methods: qualitative data, such as customer feedback or social media posts are considered unstructured data.

The Security Playbook for Remote-first Organizations
Security

The Security Playbook for Remote-first Organizations

The Security Playbook for Remote-first Organizations

The sudden shift to remote work in 2020 exposed companies to a variety of new security challenges that haven’t gone away. Review the seven most crucial areas of security for emerging remote-first organizations

4 Data Governance Best Practices
Blog

4 Data Governance Best Practices

4 Data Governance Best Practices

Data governance is the principled approach to managing data during its life cycle — from the moment you generate or collect data to its disposal. Good data governance ensures that data is kept private, accurate, usable, and most of all: secure.

How Penetration Testing Helps Cloud DLP
Blog

How Penetration Testing Helps Cloud DLP

How Penetration Testing Helps Cloud DLP

The market for penetration testing is expected to reach $3.1 billion by 2027, rising at a market growth of 12% CAGR during this time. Fueled by the rising number of mega-breaches and more sophisticated attacks, IT teams are taking a more proactive approach, using penetration testing to validate and improve their security configurations.

Distributed Tracing with Datadog
Engineering

Distributed Tracing with Datadog

Distributed Tracing with Datadog

Here at Nightfall we ensure that we are always using the most appropriate technology and tools while building services. Our architecture involves serverless functions, relational and NoSQL databases, Redis caches, Kafka and microservices written in Golang and deployed in a Kubernetes cluster. To effectively monitor and easily troubleshoot our services, we use distributed tracing across our services.

How To Protect and Store Sensitive Data in SaaS Platforms with Cloud DLP
Blog

How To Protect and Store Sensitive Data in SaaS Platforms with Cloud DLP

How To Protect and Store Sensitive Data in SaaS Platforms with Cloud DLP

Mega-breaches, or reported breach incidents that impact more than one million records, have increased dramatically. Our analysis shows that, on average, mega-breaches increased 36% year over year since 2016.

Data Loss Prevention (DLP) on Jira and Confluence Data Center & Server Editions

Data Loss Prevention (DLP) on Jira and Confluence Data Center & Server Editions

Data Loss Prevention (DLP) on Jira and Confluence Data Center & Server Editions

Jira and Confluence house high volumes of customer information, tickets, notes, wiki articles, and more. To scan Jira and Confluence Data Center or Server editions, you can use Nightfall’s APIs to scan data at-rest in these silos. In this article, we’ll walk through how you can run a full historical scan on your Jira and Confluence data to discover sensitive data, like API keys and PII.

How To Manage The Hidden Impacts of Data Leak With Cloud DLP
Blog

How To Manage The Hidden Impacts of Data Leak With Cloud DLP

How To Manage The Hidden Impacts of Data Leak With Cloud DLP

Data leaks are a type of data loss threat that often fly under the radar — making them potentially more damaging than a malware or ransomware attack. Compared to data breaches, data leaks put customer information at risk accidentally. Data leaks can lead to credit card fraud, extortion, stolen IP, and further attacks by cybercriminals who seek to take advantage of security misconfigurations.

ICYMI: 5 Major Considerations for Slack Security in 2022
Blog

ICYMI: 5 Major Considerations for Slack Security in 2022

ICYMI: 5 Major Considerations for Slack Security in 2022

We hosted a webinar alongside Bluecore CISO Brent Lassi to discuss data security risks facing high-growth organizations like his on SaaS systems like Slack. Watch the following clips to learn 5 important lessons about Slack and SaaS security that are worth keeping in mind this year.

The Essential Guide to Slack Data Loss Prevention (DLP)
Guides

The Essential Guide to Slack Data Loss Prevention (DLP)

The Essential Guide to Slack Data Loss Prevention (DLP)

How to implement data loss prevention (DLP) on Slack, and detect leakage of sensitive data across any Slack workspace.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo