Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

What is Social Engineering?
Guides

What is Social Engineering?

What is Social Engineering?

As phishing attacks grow, its important to understand social engineering and how it manifests.

A Guide to VPN Security
Guides

A Guide to VPN Security

A Guide to VPN Security

VPN is an important component of your company’s remote work security features. Learn how to get the most out of one.

6 Identity and Access Management Best Practices
Guides

6 Identity and Access Management Best Practices

6 Identity and Access Management Best Practices

Stolen credentials are among the biggest threats to data security across industries, accounting for around 80% of data breaches. In 2022 alone, nearly half of breaches during the first six months involved the theft of passwords and user accounts.

ICYMI: 4 SaaS Security Lessons to Keep Top of Mind in 2021
Guides

ICYMI: 4 SaaS Security Lessons to Keep Top of Mind in 2021

ICYMI: 4 SaaS Security Lessons to Keep Top of Mind in 2021

At the end of 2020, we hosted a webinar alongside Sisense's Chief Security & Trust Officer, Ty Sbano titled Securing Best of Breed SaaS applications in 2021. The discussion focused on reviewing the most important security trends of last year and how that should inform security programs this year. As 2021 continues to progress, these are the 4 trends and lessons we think are worth keeping in mind.

Business Continuity: How to Plan for the Worst
Guides

Business Continuity: How to Plan for the Worst

Business Continuity: How to Plan for the Worst

If the last year has taught us anything, “hope for the best and plan for the worst” should be the new mantra of business owners and IT professionals. No one could have predicted the global pandemic that wreaked havoc on industries and businesses around the world; yet, those companies with a business continuity plan were far better off than those without one.

Looking ahead to infosec’s biggest challenges in 2021
Newsletter

Looking ahead to infosec’s biggest challenges in 2021

Looking ahead to infosec’s biggest challenges in 2021

The Nightfall blog is a resource for information security professionals to learn more about the challenges we face in the industry. Every week, Nightfall publishes news and insights from the world of cloud security to help you stay current with the cybersecurity world and better prepare for threats before they become serious problems.

Cloud DLP and Regulatory Compliance: 3 Things You Must Know
Guides

Cloud DLP and Regulatory Compliance: 3 Things You Must Know

Cloud DLP and Regulatory Compliance: 3 Things You Must Know

Compliance regimes may seem burdensome, but the goal of these policies is to prevent a devastating data breach that can bankrupt a business and cause myriad problems for consumers. It’s important to understand the differences between compliance and security, as well as how data loss prevention (DLP) allows your organization to accomplish both objectives efficiently and affordably.

How to Create a Cloud Security Framework
Guides

How to Create a Cloud Security Framework

How to Create a Cloud Security Framework

Strong data loss prevention (DLP) requires a multifaceted process that requires layering tools, policies, and approaches. In addition to having a range of network, endpoint, and cloud DLP solutions in place, businesses need a strong foundation of policies, guiding principles, and rules underpinning the approach to data security.

The Economics of Data Loss Prevention
Guides

The Economics of Data Loss Prevention

The Economics of Data Loss Prevention

Every business needs to enforce strong data policies — backed by data loss prevention tools –– and dedicate an investment in time, money, and effort.

6 Updates to Make to Your Cloud Security Policy
Guides

6 Updates to Make to Your Cloud Security Policy

6 Updates to Make to Your Cloud Security Policy

In a recent survey, 84% of organizations reported finding it difficult to maintain security configurations across their cloud services. Organizations across industries are struggling to protect their valuable information, in part because they don’t understand the extent of security measures built-in to cloud platforms. As a result, Gartner predicts that 95% of all cloud security failures (through 2020) will be primarily the customer’s fault.

3 Permanent Security Risks in a Post-Pandemic World
Guides

3 Permanent Security Risks in a Post-Pandemic World

3 Permanent Security Risks in a Post-Pandemic World

We predict three security risks will become persistent threats to businesses of all sizes going forward.

Network, Endpoint, and Cloud DLP: A Quick Guide
Guides

Network, Endpoint, and Cloud DLP: A Quick Guide

Network, Endpoint, and Cloud DLP: A Quick Guide

In this guide we distinguish between network, endpoint, and cloud DLP so you can operationalize each effectively.

How is Data Stored in Confluence?
Guides

How is Data Stored in Confluence?

How is Data Stored in Confluence?

When it comes to safeguarding confidential information, Atlassian relies on third-party apps, like Nightfall AI.

Why Third-Party Risk on Google Drive Should Be a #1 Concern
Guides

Why Third-Party Risk on Google Drive Should Be a #1 Concern

Why Third-Party Risk on Google Drive Should Be a #1 Concern

Google Drive is one of the more vulnerable content service platforms to third-party risks. Learn how to identify this risk.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo