From LastPass and Okta to Slack and CircleCI, the news has been filled with headlines reporting on the aftermath of these incidents. We wanted to briefly cover these stories and discuss their implications for you in the current year
One of the most important infosec tools is a SIEM, or Security Information and Event Management System.
The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.
We’re excited to introduce a new PHI detector that is available to all customers on the Nightfall platform.
we are going to show you how to best set up Nightfall to discover and protect HIPAA data stored across your organization
We’ve been hard at work expanding Nightfall’s secret detection capabilities to improve customers’ remediation workflows.
We’re going to separate signal and noise by disambiguating the term zero trust. We’ll talk about what it is, why it matters, and key takeaways you should have regarding the state of cybersecurity in 2023.
Jason Lakeman joins Nightfall as our Director of Demand Generation. Jason is a wealth of knowledge about the marketing industry and brings with him a very holistic approach to understanding and evaluating marketing campaigns.
Read this guide to understand core aspects of PCI compliance and security standards, as well as how to implement them.
The shared responsibility model is a cybersecurity framework that works to ensure the most secure environment and infrastructure for both cloud service providers and their customers.
2022 has been a busy and exciting year for us here at Nightfall as we’ve built out the platform in response to these developments. We wanted to take the time to reflect on what we accomplished this year and how it’s moving our vision forward.
The ISO 27001 is one of the most recognized security standards for private sector organizations across the globe and is often required by prospective enterprise customers, helping organizations unlock new business opportunities.
In this post, we’ll briefly outline the structure of ISO and highlight new control areas required by the new ISO 27001:2022 standard.
Between supply chain attacks, API key leaks, and other security risks, 2022 revealed that security challenges remain for orgs on GitHub
Cryptojacking is the theft of computational resources for the purpose of mining a cryptocurrency.
The Atlassian ecosystem provides thousands of companies with the ability to collaborate remotely through powerful, feature-rich SaaS applications like Jira. As such tools become the norm across companies, big and small, the amount of sensitive information stored in these systems will increase. This means that organizations need to prioritize minimizing the risk of exposure within cloud environments.