
Third-party risk has always been a concern for organizations, but since COVID and the rise of remote work, we’ve seen a dramatic acceleration in campaigns leveraging software supply chain attacks. Not just through open source vulnerabilities, but through closed source applications and services as well

We recently hosted a live discussion covering emerging trends within the cloud security space, primarily reflecting on how organizations could adopt a posture of continuous security and compliance across their SaaS applications. Continue on below to view the highlights from this discussion.

We're living in the era of "giga-breach," where cloud data breaches can easily expose in excess of one billion records. As such, the stakes couldn't be higher for cloud security teams seeking to secure cloud environments. That's why it's important to understand the key vectors driving data breaches today. Read on to learn more.

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

At the beginning of every startup's journey, the question plaguing every technical founder and their team is how to build their tech stack. A lot of thought must go into this question because it informs how the startup will adapt to the demands of business growth and any necessary adjustments or pivots of the business.

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Broadly speaking, an information security program is a set of activities and initiatives that support a company’s information technology while protecting the security of business data and enabling the company to accomplish its business objectives. An information security program safeguards the proprietary information of the business and its customers.

In early April, the tech industry witnessed a major GitHub security incident targeting GitHub organizations using Heroku and Travis CI. GitHub was made aware of this threat via an attack leveraging AWS API keys to GitHub’s own npm production infrastructure.

Discover what data lineage is and why combining data lineage with AI-driven classification is critical for modern DLP strategies. Learn how tracking data's origin and movement while accurately identifying sensitive content prevents leaks in SaaS, AI, and cloud environments.

Explore the top Cyberhaven alternatives and competitors in 2025. Discover solutions like Nightfall AI, Code42 Incydr, Proofpoint ObserveIT, Endpoint Protector, and Symantec DLP to address modern data loss prevention (DLP) challenges with advanced features, seamless deployment, and comprehensive coverage.
In December 2024, Cyberhaven fell victim to a sophisticated cyberattack that exploited a phishing campaign targeting its Chrome Web Store account. This breach compromised over 400,000 users by injecting malicious code into its browser extension, exfiltrating sensitive data such as cookies and session tokens. The incident ...

Code42 Incydr is among the legacy solutions aiming to mitigate insider threats, yet it doesn’t always meet every organization’s needs. In the following article, we examine Code42’s capabilities and limitations through a 60-question FAQ that addresses everything you'd want to know when evaluating DLP and IRM solutions.

Data exfiltration poses a significant threat to organizations across all industries. With cybercriminals using increasingly sophisticated methods to illicitly obtain sensitive information, IT and security teams face the daunting task of protecting their digital assets against both internal and external threats. This webinar will provide your team some practical strategies to enhance your company's defenses against data exfiltration.

Email remains a critical channel for business communication and also remains a prime exfiltration and attack vector. Traditional Secure Email Gateways (SEGs) and rules-based DLP solutions are proving inadequate against data loss, exfiltration, sophisticated attacks and the complexities of modern cloud environments. Whether your organization relies on Gmail or Exchange or a hybrid email environment, Nightfall AI can protect your email against data loss and exfiltration with a comprehensive, flexible, and efficient approach to protecting your email across platforms.

Nightfall for Notion DLP is purpose-built to pinpoint sensitive data across Notion workspaces. Whether you’re using Notion as an internal wiki, a note-taking app, or something more, Nightfall’s AI-powered detectors will identify and remediate high-priority risks to ensure that your business stays continuously secure and compliant as you scale.

All employees have a part to play in keeping company secrets safe—however, developers have an outsized role due to their privileged access to sensitive databases, production systems, and source code. With these unique challenges in mind, Nightfall partnered with Snyk to offer AI-powered secrets scanning for developers working in every stage of the code-to-cloud lifecycle.

Generative AI is exploding, allowing companies to do more with less. It is, however, also exposing companies to more data security risks than ever before. In our upcoming fireside chat, we'll join Enrique Salem, former CEO of Symantec, and Isaac Madan, CEO of Nightfall, to discuss the biggest security risks of Gen AI, as well as strategies you need to stay compliant without impacting employee innovation. By the end of the chat, you'll be armed with the tools you need to safely use ChatGPT and other Gen AI tools across your business. See you there!

Healthcare organizations require an effective way to scale HIPAA compliance enforcement across their cloud applications without excessive time and resource commitment. This requires a high-accuracy solution capable of parsing context to identify PHI violations as they are defined by HIPAA
Data loss prevention (DLP) is an important part of data security and compliance in the cloud, especially for organizations regulated by HIPAA. Furthermore, healthcare teams using Slack must follow specific guidelines laid out in Slack’s Business Associate Agreement (BAA).
Data loss prevention (DLP) is an important part of data security and compliance in the cloud, especially for organizations using SaaS applications that store high volumes of data. Companies turn to DLP solutions to discover, classify, and protect their sensitive data in environments like Jira, and maintain compliance with regimes like GDPR, CCPA, PCI, and more.
Data loss prevention (DLP) is an important part of data security and compliance in the cloud, especially for organizations using SaaS applications that store high volumes of data. Companies turn to DLP solutions to discover, classify, and protect their sensitive data in environments like Google Drive, and maintain compliance with regimes like GDPR, CCPA, PCI, and more.

As a result of growing data breaches governments across the world are beginning to implement compliance regimes which require organizations to understand the quantity and nature of that data they’re ingesting. The Nightfall developer platform is designed to help organizations accomplish this with APIs that allow developers to stream data to our machine learning detectors for classification.
As organizations continue to rapidly adopt SaaS and cloud infrastructure, IT and security teams are becoming stretched. The expanding universe of business-critical cloud applications creates increased risk for the exposure of sensitive data like PII, PHI, as well as secrets and credentials. Cloud data protection is essential to ensuring employees follow best practices for handling sensitive data and that systems are configured in a manner that prevents unauthorized access.

