Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Vulnerability Management Lifecycle, Process, and Best Practices
Blog

Vulnerability Management Lifecycle, Process, and Best Practices

Vulnerability Management Lifecycle, Process, and Best Practices

The vulnerability management lifecycle reflects the fact that cyber defense is a full-time occupation. Vulnerability management should be iterative, with constant monitoring, documentation, and review of your organization's security protocols and defense. From updating your software to recording new patches, vulnerability management is a constant process that benefits from automated tools like Nightfall.

7 Indicators of Compromise: The Essential List for Breach Detection
Blog

7 Indicators of Compromise: The Essential List for Breach Detection

7 Indicators of Compromise: The Essential List for Breach Detection

Indicators of compromise are the red flags of the information security world. These helpful warnings allow trained professionals to recognize when a system may be under attack or if the attack has already taken place, providing a way to respond to protect information from extraction.

5 Types of Social Engineering Attacks and How to Mitigate Them
Blog

5 Types of Social Engineering Attacks and How to Mitigate Them

5 Types of Social Engineering Attacks and How to Mitigate Them

Social engineering is a type of cyber attack that targets people to gain access to buildings, systems, or data. Social engineering attacks exploit human vulnerabilities to get inside a company’s IT system, for instance, and access its valuable information.

How to secure codebases from secrets exfiltration
Newsletter

How to secure codebases from secrets exfiltration

How to secure codebases from secrets exfiltration

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

How to Comply with Facebook’s New Data Protection Assessment
Blog

How to Comply with Facebook’s New Data Protection Assessment

How to Comply with Facebook’s New Data Protection Assessment

Recently, Facebook announced a new initiative aimed at protecting how its users’ data is managed across its platforms: the Data Protection Assessment. The assessment consists of a questionnaire for apps that access advanced permissions and specifically focuses on how developers protect, share and use platform data.

Developing Secure Web Applications: 6 Best Practices
Blog

Developing Secure Web Applications: 6 Best Practices

Developing Secure Web Applications: 6 Best Practices

When businesses think about maintaining cybersecurity, the first thing that comes to mind is often endpoint and network security. However, web application security is becoming increasingly important. There have been numerous high-profile attacks on web applications in recent years; in 2020, for instance, the Twitter accounts of famous people were compromised as part of a bitcoin scam.

Cloud Data Protection: What You Need to Know
Blog

Cloud Data Protection: What You Need to Know

Cloud Data Protection: What You Need to Know

It’s no surprise that cloud adoption continues to be a major force impacting organizations today. A 2020 McKinsey survey indicated that many organizations saw several years worth of digital transformation take place in 2020.

Is DocuSign HIPAA Compliant?
Blog

Is DocuSign HIPAA Compliant?

Is DocuSign HIPAA Compliant?

Historically, processing claims, forms, and legal documents was an expensive and time-consuming affair that took place over fax and mail. DocuSign is one of the oldest companies in the electronic document processing space.

Nightfall’s data protection & classification platform enables SOC 2 compliance
Blog

Nightfall’s data protection & classification platform enables SOC 2 compliance

Nightfall’s data protection & classification platform enables SOC 2 compliance

Security teams that work in highly regulated industries or build solutions for consumers must adhere to compliance controls and regimes required for their business. One of the most important compliance requirements for many companies is the SOC 2 audit. The SOC 2 audit provides detailed information and quality assurance about essential security factors such as the confidentiality of data under your organization's stewardship, privacy controls, and many other standards.

ICYMI: 4 lessons for securing codebases from secrets exfiltration
Blog

ICYMI: 4 lessons for securing codebases from secrets exfiltration

ICYMI: 4 lessons for securing codebases from secrets exfiltration

Last month we hosted a webinar dedicated to discussing the issue of codebase security. As trends like secrets and credential exfiltration continue to be of concern within systems like GitHub, threats, such as cryptojacking and supply side attacks, have become more of a problem.

Preventing data loss in data warehouses with the Nightfall Developer Platform
Security

Preventing data loss in data warehouses with the Nightfall Developer Platform

Preventing data loss in data warehouses with the Nightfall Developer Platform

Data warehouses power your data analysis and business intelligence operations so you can level up your knowledge and progress toward bigger business goals. Like any key component of your tech stack, using data warehouses effectively also requires care and caution — especially when uploading and sharing sensitive information.

The NIST Cybersecurity Framework: Security Checklist And Best Practices
Blog

The NIST Cybersecurity Framework: Security Checklist And Best Practices

The NIST Cybersecurity Framework: Security Checklist And Best Practices

The National Institute of Standards and Technology (NIST) is part of the US Department of Commerce and was founded in 1901. NIST was originally established to help the U.S. industry become more competitive with economic rivals and peers, such as the UK and Germany. NIST prioritizes developing measurements, metrics, and standards for technology used in different industries.

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform
Security

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform

Infosec leaders have a lot of corners to cover in their cybersecurity strategy. When crafting the tactics and onboarding the platforms that will protect sensitive information, the checklist of requirements could be missing a very important vector for attack, compliance risk or data loss: application logs.

What can we learn from the top 100 data breaches of the past 15+ years?
Newsletter

What can we learn from the top 100 data breaches of the past 15+ years?

What can we learn from the top 100 data breaches of the past 15+ years?

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

GLBA Compliance Checklist: Keeping Financial Data Safe And Secure
Blog

GLBA Compliance Checklist: Keeping Financial Data Safe And Secure

GLBA Compliance Checklist: Keeping Financial Data Safe And Secure

GLBA compliance isn’t something to take lightly. These measures are strictly enforced by the Federal Trade Commission (FTC). In 2018, for instance, Venmo and its parent company PayPal reached a settlement after complaints about the company’s handling of privacy disclosures.

Is Dropbox HIPAA Compliant?
Guides

Is Dropbox HIPAA Compliant?

Is Dropbox HIPAA Compliant?

Dropbox is known for being a convenient file sharing and storage tool. For over a decade, Dropbox has allowed teams to collaborate cross- functionally by providing a single source of truth. With files being managed and synced to a central location, teams can work together without issues of version control. Even in a post- Google Drive and OneDrive era, Dropbox remains important, as not everyone uses the same productivity suites.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo