Posts tagged with "Personally-identifiable Information"
Apr 7, 2021
Nightfall brings news and resources for startups and security practitioners
This month, we’re happy to announce a discount for Carta users — 25% off the first year of Nightfall for Startups. On the Nightfall blog, we took a look at best practices for implementing bring your own device (BYOD) and identity and access management (IAM) policies for your organization. Finally, read our case study with Yieldstreet and learn how DLP helps secure investor data and provide wider access to investment opportunities for non-accredited investors.
Oct 15, 2020
Add DLP to Airtable with Nightfall’s developer platform
Like many high-impact SaaS platforms, Airtable does not have native data loss prevention (DLP) built in. Working in real time with Airtable’s spreadsheets and databases can put an organization’s sensitive data at risk of exposure or loss. Look for ways to add DLP functionality to Airtable — namely, with the fully customizable Nightfall API platform.
Oct 1, 2020
Nightfall’s Data Loss Prevention Stops Cloud Data Exfiltration
Cloud data loss prevention (DLP) remains one of the few ways to retain data visibility within SaaS and IaaS systems and put controls in place that greatly limit the occurrence of data exfiltration in these environments.
Sep 29, 2020
Implement strong content moderation policies with Nightfall DLP
Lax or undefined policies for conduct and communications standards can leave the door open for sharing the wrong things at work. Data loss prevention (DLP) can help solve the content moderation problem with automated scanning of SaaS environments to identify improper messages before they’re shared.
Aug 6, 2020
6 questions to ask for protecting student data in distance learning
Tech and security decision makers working to protect schools should ask six main questions to diagnose their organizations’ readiness to move instruction online, identify gaps, and find solutions to their most pressing issues in student data security. We're breaking down each of these questions and providing some insight into how to approach the biggest problems that educational tech leaders face, in the best and worst times alike.
Jul 17, 2020
5 Common Accidental Sources of Data Leaks
How do bad actors gain access to a company's data? Most of the time, well-meaning everyday people are the real source of data insecurity. This list of five common sources of accidental data leaks will help you identify the problems that could be lurking in your systems, apps, and platforms.
Jun 18, 2020
Keeping the Shared Responsibility Model in Mind When Adopting AWS (and Other Cloud Services)
Understanding the shared responsibility model of cloud services is perhaps one of the most important aspects of cloud security. Knowledge of this model allows organizations to operationalize security programs rooted in a proper understanding of what resources and settings they have control over and visibility into once they migrate to the cloud. While the shared […]