Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

What is ePHI? A Guide to electronic Protected Health Information (ePHI)
Blog

What is ePHI? A Guide to electronic Protected Health Information (ePHI)

What is ePHI? A Guide to electronic Protected Health Information (ePHI)

ePHI stands for electronic protected health information. Electronic protected health information is protected under the Health Insurance Portability and Accountability Act of 1996, commonly known as HIPAA.

What is the HIPAA Security Rule?
Blog

What is the HIPAA Security Rule?

What is the HIPAA Security Rule?

Title II of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) has two key provisions: the Privacy Rule and the HIPAA Security Rule.

Two Concerning Security Trends Highlighted by Recent Breaches
Blog

Two Concerning Security Trends Highlighted by Recent Breaches

Two Concerning Security Trends Highlighted by Recent Breaches

While these two trends—the emergence of misconfigurations and supply chain attacks—exist as separate concerns, breaches this year have illustrated how these trends are converging and how threat actors are taking advantage of both.

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC
Newsletter

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

The Nightfall blog is a knowledge base for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Addressing 3 Critical E-discovery Challenges Upstream through Data Governance
Blog

Addressing 3 Critical E-discovery Challenges Upstream through Data Governance

Addressing 3 Critical E-discovery Challenges Upstream through Data Governance

Today, for enterprises and even SMB companies, IT is a sprawling but interconnected universe of applications, devices, and services all running in tandem to maintain the lifeblood of these organizations—data.

A Quick Guide To Information Security Programs
Blog

A Quick Guide To Information Security Programs

A Quick Guide To Information Security Programs

Broadly speaking, an information security program is a set of activities and initiatives that support a company’s information technology while protecting the security of business data and enabling the company to accomplish its business objectives. An information security program safeguards the proprietary information of the business and its customers.

GitHub Supply Chain Attacks Highlight the Urgency of Zero Trust SaaS Data Security
Guides

GitHub Supply Chain Attacks Highlight the Urgency of Zero Trust SaaS Data Security

GitHub Supply Chain Attacks Highlight the Urgency of Zero Trust SaaS Data Security

In early April, the tech industry witnessed a major GitHub security incident targeting GitHub organizations using Heroku and Travis CI. GitHub was made aware of this threat via an attack leveraging AWS API keys to GitHub’s own npm production infrastructure.

Understanding the GLBA Safeguards Rule
Blog

Understanding the GLBA Safeguards Rule

Understanding the GLBA Safeguards Rule

The Gramm-Leach-Bliley Act (GLBA) aims to protect consumer financial privacy with three provisions: the Financial Privacy Rule, the Safeguards Rule, and the Pretexting Provisions.

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC
Announcement

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

Nightfall Joins Snyk Partner Program to Expand Security across the SDLC

We’re pleased to announce that Nightfall has joined Snyk’s Technology Alliance Partner Program (TAPP). Nightfall will sit alongside partners like RedHat, and Hashicorp to provide critical DevSecOps functionality to developers.

Network Segmentation: What Is It and How Does It Affect PCI Scope?
Blog

Network Segmentation: What Is It and How Does It Affect PCI Scope?

Network Segmentation: What Is It and How Does It Affect PCI Scope?

Network segmentation is a practice that can dramatically lower the time, effort and cost of a PCI DSS assessment. Not only is it an industry best practice for security cardholder data, but it’s also an effective way of controlling the annual commitment of meeting your PCI compliance requirements.

PCI Compliance for Small Business
Blog

PCI Compliance for Small Business

PCI Compliance for Small Business

PCI compliance applies to businesses of all sizes: In fact, the PCI Council sets compliance standards according to how many card-based transactions a business handles each year.

What are PCI Security Standards?
Blog

What are PCI Security Standards?

What are PCI Security Standards?

PCI DSS stands for Payment Card Industry Data Security Standard. This standard is set forth by the PCI Security Standards Council, an organization founded in 2006 by American Express, Discover, JCB International, Mastercard and Visa Inc.

How to Test for PCI Compliance
Blog

How to Test for PCI Compliance

How to Test for PCI Compliance

PCI compliance is a complicated matter. There are a number of different steps to meet and validate your achievement of the PCI DSS standard. In this guide, we’ll break down the steps in PCI compliance testing, the different types of PCI compliance tests, and how much it costs to complete this process.

Announcing Our Next Cloud-native Integration: Nightfall for Salesforce Enters Active Development
Announcement

Announcing Our Next Cloud-native Integration: Nightfall for Salesforce Enters Active Development

Announcing Our Next Cloud-native Integration: Nightfall for Salesforce Enters Active Development

At Nightfall, our mission is to discover and secure sensitive data in every cloud application through a cloud-native, accurate, and performant platform. Since 2019, Nightfall has partnered with some of the world’s most innovative organizations to proactively eliminate data security risks across a fleet of SaaS applications via our native integrations for Slack, Atlassian Jira, Confluence, Google Drive, and GitHub.

Understanding The HIPAA Breach Notification Rule
Blog

Understanding The HIPAA Breach Notification Rule

Understanding The HIPAA Breach Notification Rule

Some PHI breaches, however, are out of the organization’s control. Determined hackers can expose PHI, and employees can make mistakes — they’re only human, Despite training, rigorous security protocols, and constant monitoring, data breaches can happen.

What Are Covered Entities Under HIPAA?
Blog

What Are Covered Entities Under HIPAA?

What Are Covered Entities Under HIPAA?

HIPAA’s regulations refer to two parties: a covered entity and a business associate. These groups are required to achieve PHI compliance. Specifically, this means these groups are liable for protecting the confidentiality, integrity, and availability of personal health information.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.