Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Shift-Left Testing: What It Is and How It Works
Guides

Shift-Left Testing: What It Is and How It Works

Shift-Left Testing: What It Is and How It Works

If your development team isn’t yet using shift-left testing, you could be wasting time, money, and energy.

Protecting data when migrating Confluence and Jira from on-prem to cloud
Security

Protecting data when migrating Confluence and Jira from on-prem to cloud

Protecting data when migrating Confluence and Jira from on-prem to cloud

Get to know the risks that can threaten sensitive information when moving to the cloud, what’s at stake in an exfiltration event, and how Nightfall’s cloud-native DLP can protect your information while migrating to Atlassian Cloud

Now available: Nightfall DLP safeguards sensitive data in Confluence
Guides

Now available: Nightfall DLP safeguards sensitive data in Confluence

Now available: Nightfall DLP safeguards sensitive data in Confluence

The Atlassian suite makes remote collaboration easy and efficient for distributed teams. Confluence, one of Atlassian’s best known and widely used apps, is a flexible and customizable wiki solution that can host almost anything for a company. From software documentation and process docs to hosting meeting notes and project plans, the possibilities for what your team can do in Confluence are endless.

Data security is a team sport — Here’s how to stay at the top of your game
Newsletter

Data security is a team sport — Here’s how to stay at the top of your game

Data security is a team sport — Here’s how to stay at the top of your game

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the topics and threats that occur every day on the job.

GitHub DLP Remediation Guide
Guides

GitHub DLP Remediation Guide

GitHub DLP Remediation Guide

Git is a complicated protocol and because git is designed to be a full historical trail of commits, remediation is non-trivial. As a result, we’ve outlined best practices to remediate violations below.

How Micro Services Impact Your App Security
Guides

How Micro Services Impact Your App Security

How Micro Services Impact Your App Security

Microservices have many uses, and security is one area where micro services can both help — and harm. Learn how micro services provide flexibility, scalability, and both security advantages and disadvantages to app developers and their end-users. 

5 Basic Data Security Protocols Developers Must Know
Guides

5 Basic Data Security Protocols Developers Must Know

5 Basic Data Security Protocols Developers Must Know

This guide will break down some of the basic data security protocols developers must know to protect the integrity of their app and, inevitably, the data of the end-user. 

How to Future Proof Your System Against a Zero Day Exploit
Guides

How to Future Proof Your System Against a Zero Day Exploit

How to Future Proof Your System Against a Zero Day Exploit

Zero days are an IT security professional’s worst nightmare: but, there are steps you can take to minimize the risk of a zero day and recover as quickly as possible. 

Nightfall brings news and resources for startups and security practitioners
Newsletter

Nightfall brings news and resources for startups and security practitioners

Nightfall brings news and resources for startups and security practitioners

The Nightfall blog is a resource for cybersecurity professionals with news and insights from the world of cloud security. Each week we’re publishing new content to help you stay up-to-date on cybersecurity issues and to be more proactive in managing your data security.

Nightfall for GitHub, Now with Real-Time Data Loss Prevention

Nightfall for GitHub, Now with Real-Time Data Loss Prevention

Nightfall for GitHub, Now with Real-Time Data Loss Prevention

We are excited to announce that Nightfall DLP for GitHub now has two plans available: Pro and Enterprise. Both plans allow you to discover, classify and protect sensitive information in any GitHub organization by actively scanning your codebase for secrets, credentials, PII, and other business-critical data to notify you of data policy violations.

How To Conduct A Website Security Check
Guides

How To Conduct A Website Security Check

How To Conduct A Website Security Check

Follow this website security checklist to make sure you have all your bases covered when it comes to securing your business site. 

Identity and Access Management vs Password Managers: What's the Difference?
Guides

Identity and Access Management vs Password Managers: What's the Difference?

Identity and Access Management vs Password Managers: What's the Difference?

Identity and access management best practices dictate that an organization provides one digital identity per individual. That identity can be maintained, monitored, and modified as needed while the user works on different projects and in different roles.

9 BYOD Security Risks and Challenges
Guides

9 BYOD Security Risks and Challenges

9 BYOD Security Risks and Challenges

BYOD — whether instituted as a formal policy or as an adaptation to the pandemic — opens a company’s systems and platforms up to hacking, data loss, and insider threat. IT teams need to be aware of these critical BYOD security concerns, as well as implement best practices to mitigate the risks associated with shadow IT.

Quick Guide to the Difference Between a Public and a Private Cloud
Guides

Quick Guide to the Difference Between a Public and a Private Cloud

Quick Guide to the Difference Between a Public and a Private Cloud

Cloud security. Cloud architecture. Cloud storage. As you start scaling your business, you know “the cloud” is an important element of your IT capabilities. But, it can be a little confusing to understand the ins and outs of “the cloud” — especially when it comes to using cloud-based tools for your company to work remotely. 

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo