
The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Data loss prevention solutions have evolved significantly in recent years, with cloud DLP providing a cutting-edge solution to protecting sensitive data many companies share over SaaS, IaaS, and PaaS platforms. Here’s what you need to know about data loss prevention and how to implement strict controls in your business.

Slack as a product is constantly expanding with new functionality and integrations. Slack Connect is among the most popular new features Slack introduced in the past year and is growing in popularity because it’s an easy way to stay connected with people you work with outside your organization — in real time with all the features that Slack offers.

The vulnerability management lifecycle reflects the fact that cyber defense is a full-time occupation. Vulnerability management should be iterative, with constant monitoring, documentation, and review of your organization's security protocols and defense. From updating your software to recording new patches, vulnerability management is a constant process that benefits from automated tools like Nightfall.

Social engineering is a type of cyber attack that targets people to gain access to buildings, systems, or data. Social engineering attacks exploit human vulnerabilities to get inside a company’s IT system, for instance, and access its valuable information.

Indicators of compromise are the red flags of the information security world. These helpful warnings allow trained professionals to recognize when a system may be under attack or if the attack has already taken place, providing a way to respond to protect information from extraction.

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Recently, Facebook announced a new initiative aimed at protecting how its users’ data is managed across its platforms: the Data Protection Assessment. The assessment consists of a questionnaire for apps that access advanced permissions and specifically focuses on how developers protect, share and use platform data.

When businesses think about maintaining cybersecurity, the first thing that comes to mind is often endpoint and network security. However, web application security is becoming increasingly important. There have been numerous high-profile attacks on web applications in recent years; in 2020, for instance, the Twitter accounts of famous people were compromised as part of a bitcoin scam.

Security teams that work in highly regulated industries or build solutions for consumers must adhere to compliance controls and regimes required for their business. One of the most important compliance requirements for many companies is the SOC 2 audit. The SOC 2 audit provides detailed information and quality assurance about essential security factors such as the confidentiality of data under your organization's stewardship, privacy controls, and many other standards.

Last month we hosted a webinar dedicated to discussing the issue of codebase security. As trends like secrets and credential exfiltration continue to be of concern within systems like GitHub, threats, such as cryptojacking and supply side attacks, have become more of a problem.

Infosec leaders have a lot of corners to cover in their cybersecurity strategy. When crafting the tactics and onboarding the platforms that will protect sensitive information, the checklist of requirements could be missing a very important vector for attack, compliance risk or data loss: application logs.

The National Institute of Standards and Technology (NIST) is part of the US Department of Commerce and was founded in 1901. NIST was originally established to help the U.S. industry become more competitive with economic rivals and peers, such as the UK and Germany. NIST prioritizes developing measurements, metrics, and standards for technology used in different industries.

This list of five common sources of accidental data leaks will help you identify the problems that could be lurking in your systems, apps, and platforms. Use these examples to prepare tighter security controls and keep internal problems from becoming major issues across your entire organization.

If your organization is in a similar position, we want to help ease the transition and have a no-cost option that can help keep your mission-critical data safe via data loss prevention on the cloud. Nightfall DLP for Slack is available at no cost from March 16th until October 31st, 2020.

Maynard Webb is a tech industry leader and veteran with a distinguished career. Since joining IBM straight out of college, he’s had a variety of roles—from entry-level to CEO and board member—in some of the tech industry’s most prestigious companies

As we reach the halfway point of 2020, we see a long and overdue dedication to the BLM movement across the country. The senseless murders of George Floyd, Ahmaud Arbery, Breonna Taylor, and countless others underscore the severe issues of racism and injustice we live with every single day.

This post outlines how each of the three steps of DLP supports compliance and regulatory standards, with a look into a hypothetical case study covering business associate agreements required for HIPAA compliance. Finally, we’ll share how a solid DLP solution can take on your company’s data governance.

Ryan Nece followed in his father Ronnie Lott’s footsteps to become a Super Bowl champion, philanthropist, and venture capital leader. He’s building his legacy as the co-founder and managing partner of Next Play Capital, a VC firm that’s investing in rising startups

Data exfiltration poses a significant threat to organizations across all industries. With cybercriminals using increasingly sophisticated methods to illicitly obtain sensitive information, IT and security teams face the daunting task of protecting their digital assets against both internal and external threats. This webinar will provide your team some practical strategies to enhance your company's defenses against data exfiltration.

Email remains a critical channel for business communication and also remains a prime exfiltration and attack vector. Traditional Secure Email Gateways (SEGs) and rules-based DLP solutions are proving inadequate against data loss, exfiltration, sophisticated attacks and the complexities of modern cloud environments. Whether your organization relies on Gmail or Exchange or a hybrid email environment, Nightfall AI can protect your email against data loss and exfiltration with a comprehensive, flexible, and efficient approach to protecting your email across platforms.

Nightfall for Notion DLP is purpose-built to pinpoint sensitive data across Notion workspaces. Whether you’re using Notion as an internal wiki, a note-taking app, or something more, Nightfall’s AI-powered detectors will identify and remediate high-priority risks to ensure that your business stays continuously secure and compliant as you scale.

All employees have a part to play in keeping company secrets safe—however, developers have an outsized role due to their privileged access to sensitive databases, production systems, and source code. With these unique challenges in mind, Nightfall partnered with Snyk to offer AI-powered secrets scanning for developers working in every stage of the code-to-cloud lifecycle.

Generative AI is exploding, allowing companies to do more with less. It is, however, also exposing companies to more data security risks than ever before. In our upcoming fireside chat, we'll join Enrique Salem, former CEO of Symantec, and Isaac Madan, CEO of Nightfall, to discuss the biggest security risks of Gen AI, as well as strategies you need to stay compliant without impacting employee innovation. By the end of the chat, you'll be armed with the tools you need to safely use ChatGPT and other Gen AI tools across your business. See you there!

Healthcare organizations require an effective way to scale HIPAA compliance enforcement across their cloud applications without excessive time and resource commitment. This requires a high-accuracy solution capable of parsing context to identify PHI violations as they are defined by HIPAA
Data loss prevention (DLP) is an important part of data security and compliance in the cloud, especially for organizations regulated by HIPAA. Furthermore, healthcare teams using Slack must follow specific guidelines laid out in Slack’s Business Associate Agreement (BAA).
Data loss prevention (DLP) is an important part of data security and compliance in the cloud, especially for organizations using SaaS applications that store high volumes of data. Companies turn to DLP solutions to discover, classify, and protect their sensitive data in environments like Jira, and maintain compliance with regimes like GDPR, CCPA, PCI, and more.
Data loss prevention (DLP) is an important part of data security and compliance in the cloud, especially for organizations using SaaS applications that store high volumes of data. Companies turn to DLP solutions to discover, classify, and protect their sensitive data in environments like Google Drive, and maintain compliance with regimes like GDPR, CCPA, PCI, and more.

As a result of growing data breaches governments across the world are beginning to implement compliance regimes which require organizations to understand the quantity and nature of that data they’re ingesting. The Nightfall developer platform is designed to help organizations accomplish this with APIs that allow developers to stream data to our machine learning detectors for classification.
As organizations continue to rapidly adopt SaaS and cloud infrastructure, IT and security teams are becoming stretched. The expanding universe of business-critical cloud applications creates increased risk for the exposure of sensitive data like PII, PHI, as well as secrets and credentials. Cloud data protection is essential to ensuring employees follow best practices for handling sensitive data and that systems are configured in a manner that prevents unauthorized access.

