Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Nightfall Employee Spotlight: Jeannie Liou – Director of Product Marketing
Employee Spotlight

Nightfall Employee Spotlight: Jeannie Liou – Director of Product Marketing

Nightfall Employee Spotlight: Jeannie Liou – Director of Product Marketing

We’re excited to introduce Jeannie Liou who joined Nightfall as our Director of Product Marketing. With an extensive background in product marketing, Jeannie has a storied marketing career working with companies such as Apple, Rubrik, and Snowflake. She brings with her a deep knowledge of building out product positioning and messaging that resonates with customers, as well as a passion for technology that improves the way we work, transact, and collaborate.

What is DevSecOps: A Comprehensive Guide
Blog

What is DevSecOps: A Comprehensive Guide

What is DevSecOps: A Comprehensive Guide

The rise of cloud, containers, and microservices has shifted the way software developers work for good. Whereas traditionally, software developers would release a new version of an application every few months, today’s platforms allow teams to work faster and more streamlined. These advancements have led to the rise of “software, safer, sooner” — also known as DevSecOps.

The Essential Guide to CRM Data Loss Prevention in Salesforce
Guides

The Essential Guide to CRM Data Loss Prevention in Salesforce

The Essential Guide to CRM Data Loss Prevention in Salesforce

As with most SaaS applications, within Salesforce it is your organization’s responsibility to determine whether Salesforce’s default security settings meet your specific security and compliance obligations.Read this online guide, for free, to learn about the problem of data exposure in Salesforce and how to ensure compliance with HIPAA, PCI, and other leading industry standards while storing sensitive data in Salesforce.

GitHub Secrets Detection & Data Loss Prevention Guide
Guides

GitHub Secrets Detection & Data Loss Prevention Guide

GitHub Secrets Detection & Data Loss Prevention Guide

Environments like GitHub present data exposure risk in the form of secrets leakage and sensitive PII leaking from repositories. Read this online guide, for free, to learn about the problem of secrets exposure and leakage in GitHub, as well as how to easily implement secrets detection and scanning to prevent this risk.

Is Slack Secure from Threat Actors & Hackers in 2023?
Guides

Is Slack Secure from Threat Actors & Hackers in 2023?

Is Slack Secure from Threat Actors & Hackers in 2023?

When Uber was breached in September, the hacker remained undetected until they announced their presence within the org via Slack. This incident provides yet another example of Slack being leveraged by an attacker. In this post, we’re going to review some of the ways attackers have used Slack in breaches, why this is happening, and what you can do about it.

An Overview of the California Data Breach Notification Law (+Compliance Template)
Guides

An Overview of the California Data Breach Notification Law (+Compliance Template)

An Overview of the California Data Breach Notification Law (+Compliance Template)

Many states in the US have data privacy and protection statutes as part of their legal codes. For the most part, these codify what types of PII/PI constitute a data breach, as well as when and how an entity doing business should communicate with customers if a data breach occurs.

How to Use Data Loss Prevention (DLP) for LGPD Compliance
Blog

How to Use Data Loss Prevention (DLP) for LGPD Compliance

How to Use Data Loss Prevention (DLP) for LGPD Compliance

The Brazilian General Data Protection Law (LGPD) came into effect on August 16, 2020. The law creates new rights for individuals with respect to their data and imposes significant obligations on companies that process personal data. This guide will provide an overview of the key provisions of the LGPD and explain the steps that companies must take to comply with the law.

New Nightfall Platform Enhancements Makes Parsing and Managing Findings Easier
Blog

New Nightfall Platform Enhancements Makes Parsing and Managing Findings Easier

New Nightfall Platform Enhancements Makes Parsing and Managing Findings Easier

Nightfall customers have always lauded the platform’s ease of use and simplicity, but our team is always hard at work looking for ways to improve user experience. This month, we’ve made multiple features GA across the platform, that will further your ability to further customize what content and files trigger Nightfall detectors as well as the ways you can ingest this data.

November news & updates from Nightfall AI
Newsletter

November news & updates from Nightfall AI

November news & updates from Nightfall AI

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Recent AstraZeneca Breach Illustrates Risk of Credential Leakage Across Cloud Apps
Blog

Recent AstraZeneca Breach Illustrates Risk of Credential Leakage Across Cloud Apps

Recent AstraZeneca Breach Illustrates Risk of Credential Leakage Across Cloud Apps

Yesterday, TechCrunch broke a story about pharmaceutical giant AstraZeneca, which experienced a leak affecting sensitive patient data. We think this incident is worth reviewing to learn more about how data exfiltration risk is distributed across the entirety of an organization’s SaaS infrastructure.

The Essential Guide to Secrets Scanning
Blog

The Essential Guide to Secrets Scanning

The Essential Guide to Secrets Scanning

While API keys are a necessary part of modern software development, they can also be a major security risk. If an attacker is able to steal an API key, they can gain access to the data and resources that key is meant to protect. There are a number of steps you can take to protect your API keys, secrets, and credentials and prevent them from being stolen. One such method that we will cover in depth in this guide is secret scanning.

5 Stages of the Vulnerability Management Process
Blog

5 Stages of the Vulnerability Management Process

5 Stages of the Vulnerability Management Process

The threat landscape in IT is ever-evolving, with new risks arising practically daily. Trying to anticipate the next type of threat can feel a little like playing whack-a-mole. Instead, IT teams are focusing on vulnerability management: reducing the opportunities for hackers and other bad actors to find a weakness in cyber defenses.

SaaS Data Loss Prevention: What is it and Why is it Important?
Blog

SaaS Data Loss Prevention: What is it and Why is it Important?

SaaS Data Loss Prevention: What is it and Why is it Important?

With the rise of cloud-based applications, data loss prevention (DLP) has become an increasingly important part of information security. DLP refers to the policies and technologies used to prevent sensitive data from being lost or stolen. In the context of SaaS, this can include both the security measures implemented by the SaaS provider and the steps taken by the customer to protect their data. In this blog post, we'll provide a more detailed overview of what SaaS DLP is, why it's important, and how you can go about setting up a DLP strategy for your business.

Understanding Sensitive Data Discovery: Classification and Tools
Blog

Understanding Sensitive Data Discovery: Classification and Tools

Understanding Sensitive Data Discovery: Classification and Tools

In its 2022 Cost of a Data Breach report, IBM notes that for 83% of companies, it’s not if a data breach will happen — but when. The sheer volume of data, as well as the difficulty in monitoring shadow IT and the shift to remote work, means that IT security teams face a persistent and ever-changing risk landscape that makes it extremely difficult to keep information secure.

Covered Entities vs Non-Covered Entities Under HIPAA
Blog

Covered Entities vs Non-Covered Entities Under HIPAA

Covered Entities vs Non-Covered Entities Under HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 and sets forth a comprehensive set of standards for protecting sensitive patient health information. The Privacy Rule applies to all entities that fall within the definition of a "covered entity", which generally includes healthcare providers, health plans, and clearinghouses.

What is the FTC Safeguards Rule?
Blog

What is the FTC Safeguards Rule?

What is the FTC Safeguards Rule?

The FTC Safeguards Rule, is a set of regulations promulgated by the Federal Trade Commission in order to protect the privacy of consumers' personal information. The Rule requires financial institutions to develop, implement, and maintain a comprehensive information security program designed to safeguard customer information.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.