Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Six Key Security Risks of Generative AI
Blog

Six Key Security Risks of Generative AI

Six Key Security Risks of Generative AI

A deep dive into the six key security risks posted by Generative AI and the role of Data Leak Prevention (DLP) solutions in mitigating potential risks.

What is CI/CD Security? An Overview for Developers
Blog

What is CI/CD Security? An Overview for Developers

What is CI/CD Security? An Overview for Developers

Implementing robust security practices is critical in protecting your organization's data and infrastructure. In this article, we will discuss essential aspects of data security within the CI/CD pipeline.

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?
Blog

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?

In this post, we'll explore the different deployment modes of CASBs to help you determine if a CASB will work for you.

AI Sub-Processors Tracker for SaaS/IaaS
Blog

AI Sub-Processors Tracker for SaaS/IaaS

AI Sub-Processors Tracker for SaaS/IaaS

Enterprise data is already transmitting to systems like OpenAI via some of your favorite apps.

Defining Your Organization's Attack Surface: The 4 Types of Attack Surfaces
Blog

Defining Your Organization's Attack Surface: The 4 Types of Attack Surfaces

Defining Your Organization's Attack Surface: The 4 Types of Attack Surfaces

In this post, we’re going to cover four common types of attack surfaces and best practices for addressing the risks of each type.

Detecting and Preventing Corporate Credit Card Exposure
Blog

Detecting and Preventing Corporate Credit Card Exposure

Detecting and Preventing Corporate Credit Card Exposure

Learn how to prevent the abuse, exposure, and sharing of corporate credit cards via collaborative SaaS applications.

How to Protect Customer Data in Zendesk
Blog

How to Protect Customer Data in Zendesk

How to Protect Customer Data in Zendesk

Sensitive data proliferation continues to grow in Zendesk, learn how to secure your data and prevent breaches.

Employee Spotlight: Michael Gugliotti - Director of Sales Enablement
Employee Spotlight

Employee Spotlight: Michael Gugliotti - Director of Sales Enablement

Employee Spotlight: Michael Gugliotti - Director of Sales Enablement

Michael Gugliotti joins Nightfall as our Director of Sales Enablement. Mike's career has taken him on a rewarding journey that's combined his passion for education, with customer success, and sales.

Enabling Zero Trust Data Security through Security Awareness Education
Blog

Enabling Zero Trust Data Security through Security Awareness Education

Enabling Zero Trust Data Security through Security Awareness Education

In this post, we'll explore how improving employee security awareness can help companies implement zero trust data security principles

What's the difference between Regex and AI-based Detection?
Blog

What's the difference between Regex and AI-based Detection?

What's the difference between Regex and AI-based Detection?

Regular expressions (regex) and AI detection methods are two common approaches to DLP, but which one is more effective?

Data Loss Prevention Buyer's Guide (Plus Free RFP Template)
Blog

Data Loss Prevention Buyer's Guide (Plus Free RFP Template)

Data Loss Prevention Buyer's Guide (Plus Free RFP Template)

Our data loss prevention buyer's guide will help you understand differences between network & cloud solutions and comes with an RFP.

Understanding the basics of Cloud Security: Cloud Privilege Escalation
Blog

Understanding the basics of Cloud Security: Cloud Privilege Escalation

Understanding the basics of Cloud Security: Cloud Privilege Escalation

In this post, we’ll cover privilege escalation as it relates to cloud security risk and the best practices for mitigation.

Nightfall Named As A Leader in Data Loss Prevention (DLP) by G2 - Spring '23
Announcement

Nightfall Named As A Leader in Data Loss Prevention (DLP) by G2 - Spring '23

Nightfall Named As A Leader in Data Loss Prevention (DLP) by G2 - Spring '23

Nightfall has been named a Leader in Data Loss Prevention (DLP) in G2's Spring '23 rankings. Huge thank you to our customers and supporters!

The Challenges of Storing PII in the Cloud: Best Practices and Regulatory Considerations
Blog

The Challenges of Storing PII in the Cloud: Best Practices and Regulatory Considerations

The Challenges of Storing PII in the Cloud: Best Practices and Regulatory Considerations

For many organizations their attack surface is expanding, as an increasing amount of sensitive data, including customer PII is stored in the cloud.

Understanding the Basics of Cloud Security: API Security for Dummies
Blog

Understanding the Basics of Cloud Security: API Security for Dummies

Understanding the Basics of Cloud Security: API Security for Dummies

In this post, will discuss key aspects of API security and provide actionable steps for organizations to harden their APIs. 

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo