Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Enabling Zero Trust Data Security through Security Awareness Education
Blog

Enabling Zero Trust Data Security through Security Awareness Education

Enabling Zero Trust Data Security through Security Awareness Education

In this post, we'll explore how improving employee security awareness can help companies implement zero trust data security principles

What's the difference between Regex and AI-based Detection?
Blog

What's the difference between Regex and AI-based Detection?

What's the difference between Regex and AI-based Detection?

Regular expressions (regex) and AI detection methods are two common approaches to DLP, but which one is more effective?

Data Loss Prevention Buyer's Guide (Plus Free RFP Template)
Blog

Data Loss Prevention Buyer's Guide (Plus Free RFP Template)

Data Loss Prevention Buyer's Guide (Plus Free RFP Template)

Our data loss prevention buyer's guide will help you understand differences between network & cloud solutions and comes with an RFP.

Understanding the basics of Cloud Security: Cloud Privilege Escalation
Blog

Understanding the basics of Cloud Security: Cloud Privilege Escalation

Understanding the basics of Cloud Security: Cloud Privilege Escalation

In this post, we’ll cover privilege escalation as it relates to cloud security risk and the best practices for mitigation.

Nightfall Named As A Leader in Data Loss Prevention (DLP) by G2 - Spring '23
Announcement

Nightfall Named As A Leader in Data Loss Prevention (DLP) by G2 - Spring '23

Nightfall Named As A Leader in Data Loss Prevention (DLP) by G2 - Spring '23

Nightfall has been named a Leader in Data Loss Prevention (DLP) in G2's Spring '23 rankings. Huge thank you to our customers and supporters!

Understanding the Basics of Cloud Security: API Security for Dummies
Blog

Understanding the Basics of Cloud Security: API Security for Dummies

Understanding the Basics of Cloud Security: API Security for Dummies

In this post, will discuss key aspects of API security and provide actionable steps for organizations to harden their APIs. 

Understanding the Basics of Cloud Security: Cloud Attack Surfaces
Blog

Understanding the Basics of Cloud Security: Cloud Attack Surfaces

Understanding the Basics of Cloud Security: Cloud Attack Surfaces

Organizations face an ever-growing threat landscape given the growth in the cloud-based platforms, tools, and services they leverage.

Securing API Keys: A Guide for Analysts and Engineers
Blog

Securing API Keys: A Guide for Analysts and Engineers

Securing API Keys: A Guide for Analysts and Engineers

API keys, by themselves, are not inherently secure or insecure. Their security depends on how they are managed, stored, and protected.

New Content Preview Feature Results in up to 90% Productivity Increase

New Content Preview Feature Results in up to 90% Productivity Increase

New Content Preview Feature Results in up to 90% Productivity Increase

Our newest platform-wide update, content preview, is intended to provide context that Nightfall users can see at a glance to triage alerts even quicker than before.

The New Paradigm: Why Agentless Approaches to Cloud Security are Essential

The New Paradigm: Why Agentless Approaches to Cloud Security are Essential

The New Paradigm: Why Agentless Approaches to Cloud Security are Essential

Agentless solutions circumvent the limitations that are often encountered with agent-based applications, even though the latter tend to be treated as the “default” option by many practitioners.

The State of Secrets Detection in SaaS Apps
Research Report

The State of Secrets Detection in SaaS Apps

The State of Secrets Detection in SaaS Apps

Welcome to our first ever The State of Secrets Detection in SaaS Apps, an in-depth look at what security risks are posed by the data stored in organizations' SaaS applications.

Third Party Risk from Supply Chain Attacks Will be Gift that Keeps Giving in 2023
Blog

Third Party Risk from Supply Chain Attacks Will be Gift that Keeps Giving in 2023

Third Party Risk from Supply Chain Attacks Will be Gift that Keeps Giving in 2023

From LastPass and Okta to Slack and CircleCI, the news has been filled with headlines reporting on the aftermath of these incidents. We wanted to briefly cover these stories and discuss their implications for you in the current year

Understanding the basics of Cloud Security: What is a SIEM?
Blog

Understanding the basics of Cloud Security: What is a SIEM?

Understanding the basics of Cloud Security: What is a SIEM?

One of the most important infosec tools is a SIEM, or Security Information and Event Management System.

How to Set use Nightfall Compliance Templates for Pain-free HIPAA Compliance
Guides

How to Set use Nightfall Compliance Templates for Pain-free HIPAA Compliance

How to Set use Nightfall Compliance Templates for Pain-free HIPAA Compliance

we are going to show you how to best set up Nightfall to discover and protect HIPAA data stored across your organization

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.