Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

HIPAA Compliance Checklist: A Quick Guide
Blog

HIPAA Compliance Checklist: A Quick Guide

HIPAA Compliance Checklist: A Quick Guide

HIPAA compliance requires covered entities and business associates to secure protected health information. Social Security numbers, medical record numbers, health plan beneficiary numbers, account numbers, and names of patients, relatives, or employers all must be secured from unauthorized access.

5 Most Common HIPAA Violations and Their Penalties
Blog

5 Most Common HIPAA Violations and Their Penalties

5 Most Common HIPAA Violations and Their Penalties

Those who work in the healthcare industry know: HIPAA compliance is often fiercely enforced by the Department of Health and Human Services, and penalties can be steep.

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users
Newsletter

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

How to Set Up Fluent Bit and the Nightfall Filter Plugin
Engineering

How to Set Up Fluent Bit and the Nightfall Filter Plugin

How to Set Up Fluent Bit and the Nightfall Filter Plugin

Sensitive data often makes its way into logs. Though most of the time unintentional, these incidents have the potential to do a lot of damage, as they usually involve exposure of API keys, passwords, and customer data that can give attackers access to critical business data or put companies at compliance risk

How AI & Machine Learning Powers Next-Gen Data Leak Prevention (DLP)
Engineering

How AI & Machine Learning Powers Next-Gen Data Leak Prevention (DLP)

How AI & Machine Learning Powers Next-Gen Data Leak Prevention (DLP)

The current wave of digital transformation that has brought more and more businesses online has also introduced an unwelcome side effect: the surface area for attacks has ballooned.

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule
Blog

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule

The Gramm-Leach-Bliley Act, known as the GLBA, was passed in 1999 under President Clinton. The goal of the GLBA was to update and modernize the financial industry. Today, it’s primarily used to protect customer and consumer information, with steep penalties for financial institutions that violate its privacy rules. Here’s what you need to know about the GLBA and its regulations.

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams’ Efficiency
Announcement

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams’ Efficiency

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams’ Efficiency

Our team has been hard at work with continuous updates to improve and streamline the Nightfall DLP platform. We wanted to share with you the latest platform updates guaranteed to improve the speed at which security administrators and teams will be able to remediate incidents.

What is a Cyber Security Playbook and How Can it Benefit Your Security Program?
Blog

What is a Cyber Security Playbook and How Can it Benefit Your Security Program?

What is a Cyber Security Playbook and How Can it Benefit Your Security Program?

You probably don’t need anyone to tell you that, today, infosec and cybersecurity are challenging and fast-paced endeavors. In the last five years alone, we’ve seen a myriad of industry altering developments — from an ever expanding universe of privacy compliance legislation and the permanent entrenchment of hybrid and remote work, to growth in the size and scope of data breaches — the world of security has proven ever complex and ever-shifting.

Best Go Regex Library
Engineering

Best Go Regex Library

Best Go Regex Library

At Nightfall, our mission is to detect sensitive data. Today, we detect 50+ types of sensitive data, including social security numbers, API keys, street addresses, and more.

NIST vs ISO Compliance: What's the Difference?
Blog

NIST vs ISO Compliance: What's the Difference?

NIST vs ISO Compliance: What's the Difference?

As businesses and health organizations seek to strengthen cybersecurity, they’re turning frequently to compliance frameworks to help prioritize, guide, and improve decision-making and implementation. Two of the more popular compliance frameworks are the NIST CSF and the ISO 27001.

How does sensitive information end up in observability platforms?
Engineering

How does sensitive information end up in observability platforms?

How does sensitive information end up in observability platforms?

Observability (logs, traces, metrics) is a core tenet to building strong software systems. Logs are used to debug issues and check on system activity, traces provide valuable insights into system performance and architecture, and metrics allow engineering teams to closely track business metrics within their systems.

What is Data Exfiltration?
Blog

What is Data Exfiltration?

What is Data Exfiltration?

Data exfiltration, quite simply, is the risk of your data ending up somewhere it doesn’t belong. Though this definition might seem simple, understanding this risk is quite complicated — especially as companies migrate their data into the cloud. Companies that work remotely using cloud platforms like Google Drive, AWS, or Jira often struggle to maintain the visibility needed to ensure their data remains secure. This increases the risk of data exfiltration, which can often go undetected for weeks, if not longer.

What is Unstructured Data?
Blog

What is Unstructured Data?

What is Unstructured Data?

Unstructured data is data that cannot be processed and analyzed using conventional data tools and methods: qualitative data, such as customer feedback or social media posts are considered unstructured data.

The Security Playbook for Remote-first Organizations
Security

The Security Playbook for Remote-first Organizations

The Security Playbook for Remote-first Organizations

The sudden shift to remote work in 2020 exposed companies to a variety of new security challenges that haven’t gone away. Review the seven most crucial areas of security for emerging remote-first organizations

4 Data Governance Best Practices
Blog

4 Data Governance Best Practices

4 Data Governance Best Practices

Data governance is the principled approach to managing data during its life cycle — from the moment you generate or collect data to its disposal. Good data governance ensures that data is kept private, accurate, usable, and most of all: secure.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.