Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Nightfall Releases the 2025 State of Secrets Exposure Report
Blog

Nightfall Releases the 2025 State of Secrets Exposure Report

Nightfall Releases the 2025 State of Secrets Exposure Report

This year's report offers a look at what changed, what stayed the same, and where you can find a little hope in the quest for effective secrets management.

Beyond Repository Scanning: The Case for End-to-End Data Protection in Development
Blog

Beyond Repository Scanning: The Case for End-to-End Data Protection in Development

Beyond Repository Scanning: The Case for End-to-End Data Protection in Development

If your company does any software development–even internally–you need to know how to protect data at each point in the lifecycle. Learn how.

Here’s What We Can Learn from the Cyberhaven Incident
Blog

Here’s What We Can Learn from the Cyberhaven Incident

Here’s What We Can Learn from the Cyberhaven Incident

In December 2024, Cyberhaven fell victim to a sophisticated cyberattack that exploited a phishing campaign targeting its Chrome Web Store account. This breach compromised over 400,000 users by injecting malicious code into its browser extension, exfiltrating sensitive data such as cookies and session tokens. The incident ...

Top Code42 Alternatives and Competitors in 2025
Blog

Top Code42 Alternatives and Competitors in 2025

Top Code42 Alternatives and Competitors in 2025

Code42 may not be the right data security solution for every organization. Read on to learn more about Code42's top alternatives and competitors.

Top Forcepoint Alternatives and Competitors in 2025
Blog

Top Forcepoint Alternatives and Competitors in 2025

Top Forcepoint Alternatives and Competitors in 2025

Forcepoint may not be the right data security solution for every organization. Read on to learn more about Forcepoint's top alternatives and competitors.

The 12 Best Data Loss Prevention Solutions of 2025
Blog

The 12 Best Data Loss Prevention Solutions of 2025

The 12 Best Data Loss Prevention Solutions of 2025

Learn more about the top 12 best data loss prevention solutions that can help you protect sensitive data.

The 7 Most Telling Data Breaches of 2024
Blog

The 7 Most Telling Data Breaches of 2024

The 7 Most Telling Data Breaches of 2024

Get the skinny on which 2024 breaches signal the biggest data security threats, trends, and shifts.

Understanding the Limitations of Atlassian Guard DLP: What You Need to Know

Understanding the Limitations of Atlassian Guard DLP: What You Need to Know

Understanding the Limitations of Atlassian Guard DLP: What You Need to Know

Atlassian collaboration apps enable tremendous productivity, but the way most teams use them poses great risks to your data. Should you use native Atlassian DLP, or look to external cloud DLP to mitigate those risks? Take a deep dive into functionality, advantages, disadvantages, and more to find the right solution for your needs.

Securing the Human Element: A Modern Guide to Effective PII Management and Protection
Blog

Securing the Human Element: A Modern Guide to Effective PII Management and Protection

Securing the Human Element: A Modern Guide to Effective PII Management and Protection

PII remains a top target for data thieves, but is vital to numerous business workflows. Learn how to find and secure PII across SaaS and cloud workspaces in real time, minimizing data sprawl and improving your data security posture..

Loose AWS API keys: what's your real risk?
Blog

Loose AWS API keys: what's your real risk?

Loose AWS API keys: what's your real risk?

While malicious actors can gain access to systems in any number of ways, using your API key is the equivalent of walking through a wide-open door and walking in unchecked. Whoever holds that key will have direct access to what are likely your most valuable digital assets.

Intelligent Data Classification: Transforming Google Drive Security
Blog

Intelligent Data Classification: Transforming Google Drive Security

Intelligent Data Classification: Transforming Google Drive Security

Customers need an automated, dynamic, and human-centric cloud DLP solution to label and classify data in Google Drive.

How To Prevent Secrets Sprawl
Blog

How To Prevent Secrets Sprawl

How To Prevent Secrets Sprawl

Where are your credentials and secrets, and how are you protecting them?

DLP 101: How to Prevent Data Exfiltration in the Cloud
Blog

DLP 101: How to Prevent Data Exfiltration in the Cloud

DLP 101: How to Prevent Data Exfiltration in the Cloud

What is data exfiltration, and how can cloud Data Loss Prevention (DLP) help defend against it?

Top 10 Insider Risk Management Products of 2025
Blog

Top 10 Insider Risk Management Products of 2025

Top 10 Insider Risk Management Products of 2025

Discover the top insider risk management products that are changing the game in 2024.

Popular Resources

No items found.
Nightfall Mini Logo

Getting started is easy

Install in minutes to start protecting your sensitive data.

Get a demo