Nightfall brings news and resources for startups and security practitioners
The Nightfall blog is a resource for cybersecurity professionals with news and insights from the world of cloud security. Each week we’re publishing new content to help you stay up-to-date on cybersecurity issues and to be more proactive in managing your data security.
This month, we’re happy to announce a discount for Carta customers — 25% off the first year of Nightfall for Startups. On the Nightfall blog, we took a look at best practices for implementing bring your own device (BYOD) and identity and access management (IAM) policies for your organization. Finally, read our case study with Yieldstreet and learn how DLP helps secure investor data and provide wider access to investment opportunities for non-accredited investors.
Thanks for reading! We want to wish you a happy Easter and spring season ahead.
25% off first year for Carta customers new to Nightfall
Nightfall knows the value of data security for startups: you need cloud-native security that just works. Our DLP platform is designed to help you address cloud-native data security effectively and efficiently. We’ll handle securing your data, so you can focus on building the business.
We are partnering with Carta to offer Carta customers 25% off their first year subscription with Nightfall to help companies unlock growth through data security. Companies using Carta benefit from their Startup Stack, a curated directory with special offers on products and tools to help founders build and scale companies.
Carta customers who want to learn more about Nightfall can click here for more information.
Yieldstreet protects PII in Slack with Nightfall DLP
Yieldstreet is an alternative investment platform that strives to democratize access to financial products historically only available to institutional investors. Azret Deljanin, Yieldstreet’s security leader, chose Nightfall DLP to classify data in Slack for more secure workplace collaboration. Nightfall adds value for Yieldstreet by detecting, classifying, and remediating misuse of sensitive data seamlessly within their Slack app. “We can make sure that we’re using the right rule set and the right confidence level in that particular rule set,” says Azret. “And now that we’re able to review that data and understand what’s being shared within Slack, we can train our users on what’s appropriate to share.” Click here to read more.
Key Differences Between a Public and a Private Cloud
Cloud computing is a very broad category and therefore it’s likely your organization uses some or many cloud services. Some common examples of cloud-based programs — tools or services hosted on the cloud — include Google Workspace or AWS. Our guide will help break down the difference between a public and private cloud, help you learn which one is right for you, and show you how to best protect your information shared through a cloud-based program. Click here to read more.
3 BYOD Security Risks and Challenges
Bring Your Own Device, or BYOD, is a policy that allows employees to work on the device they choose, using their own laptop, mobile phone, or tablet to access their company email, work documents, and more. It’s estimated that over 50% of employees use their personal devices for some work activities. As more people use their personal smartphones or laptops to do their jobs, the security risks at an organization increase dramatically. BYOD — whether instituted as a formal policy or as an adaptation to the pandemic — opens a company’s systems and platforms up to hacking, data loss, and insider threat. Being aware of some of these critical BYOD security concerns is the first step to protecting your important, valuable company information. Click here to read more.
Identity and Access Management vs Password Managers: What’s the Difference?
Identity and access management (IAM) best practices dictate that an organization provides one digital identity per individual. That identity can be maintained, monitored, and modified as needed while the user works on different projects and in different roles. However, strong IAM requires the use of tools and platforms, in addition to the principle of least privilege, to keep valuable information secure. Here’s what to know about IAM vs password managers and how to build a system that meets your security needs. Click here to read more.
Nightfall is the industry’s first cloud-native DLP platform that discovers, classifies, and protects data via machine learning. Nightfall is designed to work with popular SaaS applications like Slack & GitHub as well as IaaS platforms like AWS. You can schedule a demo with us below to see the Nightfall platform in action.