Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

How Penetration Testing Helps Cloud DLP
Blog

How Penetration Testing Helps Cloud DLP

How Penetration Testing Helps Cloud DLP

The market for penetration testing is expected to reach $3.1 billion by 2027, rising at a market growth of 12% CAGR during this time. Fueled by the rising number of mega-breaches and more sophisticated attacks, IT teams are taking a more proactive approach, using penetration testing to validate and improve their security configurations.

Distributed Tracing with Datadog
Engineering

Distributed Tracing with Datadog

Distributed Tracing with Datadog

Here at Nightfall we ensure that we are always using the most appropriate technology and tools while building services. Our architecture involves serverless functions, relational and NoSQL databases, Redis caches, Kafka and microservices written in Golang and deployed in a Kubernetes cluster. To effectively monitor and easily troubleshoot our services, we use distributed tracing across our services.

How To Protect and Store Sensitive Data in SaaS Platforms with Cloud DLP
Blog

How To Protect and Store Sensitive Data in SaaS Platforms with Cloud DLP

How To Protect and Store Sensitive Data in SaaS Platforms with Cloud DLP

Mega-breaches, or reported breach incidents that impact more than one million records, have increased dramatically. Our analysis shows that, on average, mega-breaches increased 36% year over year since 2016.

How To Manage The Hidden Impacts of Data Leak With Cloud DLP
Blog

How To Manage The Hidden Impacts of Data Leak With Cloud DLP

How To Manage The Hidden Impacts of Data Leak With Cloud DLP

Data leaks are a type of data loss threat that often fly under the radar — making them potentially more damaging than a malware or ransomware attack. Compared to data breaches, data leaks put customer information at risk accidentally. Data leaks can lead to credit card fraud, extortion, stolen IP, and further attacks by cybercriminals who seek to take advantage of security misconfigurations.

ICYMI: 5 Major Considerations for Slack Security in 2022
Blog

ICYMI: 5 Major Considerations for Slack Security in 2022

ICYMI: 5 Major Considerations for Slack Security in 2022

We hosted a webinar alongside Bluecore CISO Brent Lassi to discuss data security risks facing high-growth organizations like his on SaaS systems like Slack. Watch the following clips to learn 5 important lessons about Slack and SaaS security that are worth keeping in mind this year.

The Essential Guide to Slack Data Loss Prevention (DLP)
Guides

The Essential Guide to Slack Data Loss Prevention (DLP)

The Essential Guide to Slack Data Loss Prevention (DLP)

How to implement data loss prevention (DLP) on Slack, and detect leakage of sensitive data across any Slack workspace.

Data Loss Prevention (DLP) for Salesforce
Announcement

Data Loss Prevention (DLP) for Salesforce

Data Loss Prevention (DLP) for Salesforce

Salesforce houses high volumes of customer information, support tickets, quotes and files, synced emails, tasks & notes, and much more. This data can often be accessed by teams across the company who may leverage Salesforce to provide prospects and customers with a great customer experience.

How to implement cloud DLP with new Nightfall tools and product updates
Newsletter

How to implement cloud DLP with new Nightfall tools and product updates

How to implement cloud DLP with new Nightfall tools and product updates

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Database Security: How Cloud DLP Can Help Protect Sensitive Data
Blog

Database Security: How Cloud DLP Can Help Protect Sensitive Data

Database Security: How Cloud DLP Can Help Protect Sensitive Data

Databases are great targets for hackers and cybercriminals. There’s a wealth of information that can be gained by infiltrating a database, from proprietary intellectual property to customer data to financial records. One of the reasons why database security is so difficult is known as “Anderson’s rule” — that the more useable and more accessible the database, the more vulnerable it is to security threats.

Building Endpoint DLP to Detect PII on Your Machine in Real-Time

Building Endpoint DLP to Detect PII on Your Machine in Real-Time

Building Endpoint DLP to Detect PII on Your Machine in Real-Time

In this tutorial, we will build a lightweight endpoint DLP scanner that scans files on your device in real-time for sensitive data like PII & secrets using Nightfall's data loss prevention APIs.

Creating a custom Temporal data convertor for encryption
Engineering

Creating a custom Temporal data convertor for encryption

Creating a custom Temporal data convertor for encryption

Nightfall is a data security vendor that integrates with our customers’ third party applications (Slack, Google Drive, Github, Jira etc) to, on a continuous real-time basis, scan all content being added to these applications for sensitive data.

Data Masking Techniques and Best Practices for Data Security
Blog

Data Masking Techniques and Best Practices for Data Security

Data Masking Techniques and Best Practices for Data Security

The risks of a data leak have never been higher. Over the last year, data breach costs rose from $3.86 million to $4.24 million, a record high. Data exfiltration, sophisticated hacker attacks, and even insider threats are forcing organizations across the board to take a more sophisticated, multi-layered approach to data security.

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

In this tutorial, we will create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall's data loss prevention (DLP) APIs and the Flask framework.

How To Protect Sensitive Data with Cloud DLP
Blog

How To Protect Sensitive Data with Cloud DLP

How To Protect Sensitive Data with Cloud DLP

A recent report from IBM found that data breach costs rose from $3.86 million to $4.24 million in 2021. This year’s estimate is the highest average total cost in the 17-year history of the IBM Cost of a Data Breach Report.

6 Cloud Data Loss Prevention Best Practices & Strategies
Blog

6 Cloud Data Loss Prevention Best Practices & Strategies

6 Cloud Data Loss Prevention Best Practices & Strategies

Data loss prevention (DLP) refers to a category of tools and technologies that classify, detect, and protect information (data) in three states: data in use, data at rest, and data in motion. The purpose of DLP is to enforce corporate data security policies that govern where data does — and doesn’t — belong.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.