Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

The Basics of PCI Compliance: Merchant Levels and Requirements
Blog

The Basics of PCI Compliance: Merchant Levels and Requirements

The Basics of PCI Compliance: Merchant Levels and Requirements

PCI compliance isn’t just good for customers; it’s also good for business. Merchants that fall short of PCI compliance standards not only put their customer data at risk but also may face hefty fines. The PCI Compliance Guide reports that fines and penalties can range from $5,000 to $100,000 per month for the merchant.

Is Google Drive HIPAA Compliant?
Guides

Is Google Drive HIPAA Compliant?

Is Google Drive HIPAA Compliant?

We’ll briefly cover how healthcare organizations can use Google Drive while remaining compliant with HIPAA.

What Is PII Compliance? Requirements, Checklist & Best Practices
Blog

What Is PII Compliance? Requirements, Checklist & Best Practices

What Is PII Compliance? Requirements, Checklist & Best Practices

Research from Gartner suggests that, by 2023, more than 60% of the world’s population will be covered by some form of personal data protection legislation. From GDPR to CalPRA, privacy regulations are on the rise.

Open source data loss prevention for helpdesk ticketing systems
Guides

Open source data loss prevention for helpdesk ticketing systems

Open source data loss prevention for helpdesk ticketing systems

When your customers want help, ticketing systems provide the first line of communication between your company and your customers.

PHI Compliance: What It Is and How To Achieve It
Blog

PHI Compliance: What It Is and How To Achieve It

PHI Compliance: What It Is and How To Achieve It

For organizations that work in or partner with the healthcare industry, HIPAA compliance is of paramount importance. Keeping a patient’s medical records and personal information safe isn’t just a matter of avoiding penalties. It’s also key to building trust with patients and, ultimately, providing great patient care.

Is Zendesk HIPAA Compliant?
Guides

Is Zendesk HIPAA Compliant?

Is Zendesk HIPAA Compliant?

As an omni-channel customer service solution, Zendesk allows for companies to meet customers where they are by providing a variety of options for customer support, intake, and management of the overall customer experience (CX) process.

Is Slack Secure? Vulnerabilities and Solutions
Blog

Is Slack Secure? Vulnerabilities and Solutions

Is Slack Secure? Vulnerabilities and Solutions

Slack has become one of the most integral platforms for businesses over the last decade, with more than 12 million users currently active. Despite its popularity, however, there are some Slack security concerns that linger from the platform’s 2015 security breach.

Nightfall’s DLP API Adds Data Discovery and Classification to Your Applications
Blog

Nightfall’s DLP API Adds Data Discovery and Classification to Your Applications

Nightfall’s DLP API Adds Data Discovery and Classification to Your Applications

As a cloud-native data loss prevention solution, Nightfall DLP can natively integrate with some of the most popular SaaS applications in order to protect against the proliferation of sensitive data in these environments.

Is Atlassian Cloud HIPAA Compliant?
Guides

Is Atlassian Cloud HIPAA Compliant?

Is Atlassian Cloud HIPAA Compliant?

In 2021, digital transformation has accelerated. At the tail end of the COVID pandemic, with companies remaining remote, the demand for cloud services in the enterprise is the highest it's ever been.

Evaluating content inspection engines for data classification applications
Guides

Evaluating content inspection engines for data classification applications

Evaluating content inspection engines for data classification applications

Many organizations recognize the emergent need to discover, classify, and protect their sensitive information stored in cloud applications (SaaS) and infrastructure (IaaS) via a dedicated cloud content inspection process

How To Implement DevSecOps
Blog

How To Implement DevSecOps

How To Implement DevSecOps

Security, previously an afterthought in the product development lifecycle, is now becoming an integral part of the process. New methodologies, like DevSecOps and shift left, offer clear advantages to companies seeking to protect valuable data while still moving quickly.

Cloud Security Architecture: 5 Best Practices
Guides

Cloud Security Architecture: 5 Best Practices

Cloud Security Architecture: 5 Best Practices

Cloud programs like Slack and Google Drive allow businesses to work collaboratively and efficiently, often at a low cost. However, these cloud platforms open a business up to new levels of risk: sharing information via cloud programs can put customer data at risk.

Rapid cloud adoption and migration requires clearly defined data security policies
Newsletter

Rapid cloud adoption and migration requires clearly defined data security policies

Rapid cloud adoption and migration requires clearly defined data security policies

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security.

An Introduction To Cloud Security Posture Management (CSPM)
Blog

An Introduction To Cloud Security Posture Management (CSPM)

An Introduction To Cloud Security Posture Management (CSPM)

Many organizations are equipped to handle insider threat and external, common well-known challenges (like malware, for instance). These so-called “intentional” threats can be addressed through proactive security measures and best practices.

Shift-Left Testing: What It Is and How It Works
Guides

Shift-Left Testing: What It Is and How It Works

Shift-Left Testing: What It Is and How It Works

If your development team isn’t yet using shift-left testing, you could be wasting time, money, and energy.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo