Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

What Happened in the Snowflake Data Breach?

What Happened in the Snowflake Data Breach?

What Happened in the Snowflake Data Breach?

Explore the details of the Snowflake data breach, its impact on customers, and learn essential cybersecurity lessons from this incident.

Let's chat at Black Hat!
Blog

Let's chat at Black Hat!

Let's chat at Black Hat!

Excited for Black Hat? So are we. Let's meet! We'd love to meet with you to learn more about your data security pain points and share a bit more about our AI-powered solution.

Microsoft Purview Alternatives for Data Security and Data Loss Prevention in 2024
Blog

Microsoft Purview Alternatives for Data Security and Data Loss Prevention in 2024

Microsoft Purview Alternatives for Data Security and Data Loss Prevention in 2024

Microsoft Purview may not be the right data security solution for every organization. Read on to learn more about Microsoft Purview's top alternatives and competitors.

Nightfall AI vs. Microsoft Purview
Blog

Nightfall AI vs. Microsoft Purview

Nightfall AI vs. Microsoft Purview

How does Nightfall stack up against Microsoft Purview? Read on to find out.

Virtru Alternatives for Email Encryption and Data Security in 2024
Blog

Virtru Alternatives for Email Encryption and Data Security in 2024

Virtru Alternatives for Email Encryption and Data Security in 2024

Virtru may not be the right email encryption and data security solution for every organization. Read on to learn more about Virtru's top alternatives and competitors.

Zix Alternatives for Email Encryption and Data Security in 2024
Blog

Zix Alternatives for Email Encryption and Data Security in 2024

Zix Alternatives for Email Encryption and Data Security in 2024

Zix may not be the right email encryption and data security solution for every organization. Read on to learn more about Zix's top alternatives and competitors.

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl
Blog

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

The Disney breach is a wake-up call for any organization that may have secrets sprawled across their tech stack.

Nightfall AI vs. Google DLP
Blog

Nightfall AI vs. Google DLP

Nightfall AI vs. Google DLP

How does Nightfall stack up against Google DLP? Read on to find out.

8 Best Data Leak Prevention (DLP) Policies for Protecting Your Sensitive Data
Blog

8 Best Data Leak Prevention (DLP) Policies for Protecting Your Sensitive Data

8 Best Data Leak Prevention (DLP) Policies for Protecting Your Sensitive Data

These popular DLP policies are useful tools for protecting your sensitive data, preventing data exfiltration, securing your AI usage, and more.

Secure Your AI apps and data pipelines with Nightfall’s Firewall for AI
Announcement

Secure Your AI apps and data pipelines with Nightfall’s Firewall for AI

Secure Your AI apps and data pipelines with Nightfall’s Firewall for AI

Nightfall’s Firewall for AI acts as a trust boundary that protects sensitive company and customer data during every stage of AI model building and consumption.

Is Slack using your data to train their AI models? Here’s what you need to know.
Blog

Is Slack using your data to train their AI models? Here’s what you need to know.

Is Slack using your data to train their AI models? Here’s what you need to know.

With Slack’s AI training policy in the spotlight, it’s time to consider how you can take security for AI into your own hands.

What Happened in the Twitter Data Breach?

What Happened in the Twitter Data Breach?

What Happened in the Twitter Data Breach?

An in-depth examination of Twitter's most significant data breaches, the vulnerabilities exploited, and actionable security lessons for organizations.

Building your own AI app? Here are 3 risks you need to know about—and how to mitigate them.
Blog

Building your own AI app? Here are 3 risks you need to know about—and how to mitigate them.

Building your own AI app? Here are 3 risks you need to know about—and how to mitigate them.

From training to annotation to fine-tuning and beyond, here’s how a firewall for AI can help you stay secure as you build your AI model.

Okta Data Breach: What Happened, Impact, and Security Lessons Learned

Okta Data Breach: What Happened, Impact, and Security Lessons Learned

Okta Data Breach: What Happened, Impact, and Security Lessons Learned

A comprehensive examination of the Okta data breach, exploring the timeline of events, attack vectors, organizational impact, and critical security lessons for cybersecurity professionals.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.