Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Nightfall for Google Drive, now with remediation

Nightfall for Google Drive, now with remediation

Nightfall for Google Drive, now with remediation

Nightfall has added remediation actions for Google Drive violations, so you can fix the issue automatically or with just a click.

The Essential Guide to Content Moderation
Blog

The Essential Guide to Content Moderation

The Essential Guide to Content Moderation

According to a recent CNBC report, Google has seen a rise in posts flagged for racism or abuse on its message boards. This has caused the company to ask its employees to take a more active role in moderating internal message boards.

The business case for cloud data protection
Newsletter

The business case for cloud data protection

The business case for cloud data protection

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

What is Data Loss Prevention (DLP) And How Does It Work
Blog

What is Data Loss Prevention (DLP) And How Does It Work

What is Data Loss Prevention (DLP) And How Does It Work

Data loss prevention solutions have evolved significantly in recent years, with cloud DLP providing a cutting-edge solution to protecting sensitive data many companies share over SaaS, IaaS, and PaaS platforms. Here’s what you need to know about data loss prevention and how to implement strict controls in your business.

Ensure data security and compliance in Slack Connect with Nightfall
Blog

Ensure data security and compliance in Slack Connect with Nightfall

Ensure data security and compliance in Slack Connect with Nightfall

Slack as a product is constantly expanding with new functionality and integrations. Slack Connect is among the most popular new features Slack introduced in the past year and is growing in popularity because it’s an easy way to stay connected with people you work with outside your organization — in real time with all the features that Slack offers.

Vulnerability Management Lifecycle, Process, and Best Practices
Blog

Vulnerability Management Lifecycle, Process, and Best Practices

Vulnerability Management Lifecycle, Process, and Best Practices

The vulnerability management lifecycle reflects the fact that cyber defense is a full-time occupation. Vulnerability management should be iterative, with constant monitoring, documentation, and review of your organization's security protocols and defense. From updating your software to recording new patches, vulnerability management is a constant process that benefits from automated tools like Nightfall.

5 Types of Social Engineering Attacks and How to Mitigate Them
Blog

5 Types of Social Engineering Attacks and How to Mitigate Them

5 Types of Social Engineering Attacks and How to Mitigate Them

Social engineering is a type of cyber attack that targets people to gain access to buildings, systems, or data. Social engineering attacks exploit human vulnerabilities to get inside a company’s IT system, for instance, and access its valuable information.

7 Indicators of Compromise: The Essential List for Breach Detection
Blog

7 Indicators of Compromise: The Essential List for Breach Detection

7 Indicators of Compromise: The Essential List for Breach Detection

Indicators of compromise are the red flags of the information security world. These helpful warnings allow trained professionals to recognize when a system may be under attack or if the attack has already taken place, providing a way to respond to protect information from extraction.

How to secure codebases from secrets exfiltration
Newsletter

How to secure codebases from secrets exfiltration

How to secure codebases from secrets exfiltration

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

How to Comply with Facebook’s New Data Protection Assessment
Blog

How to Comply with Facebook’s New Data Protection Assessment

How to Comply with Facebook’s New Data Protection Assessment

Recently, Facebook announced a new initiative aimed at protecting how its users’ data is managed across its platforms: the Data Protection Assessment. The assessment consists of a questionnaire for apps that access advanced permissions and specifically focuses on how developers protect, share and use platform data.

Cloud Data Protection: What You Need to Know
Blog

Cloud Data Protection: What You Need to Know

Cloud Data Protection: What You Need to Know

It’s no surprise that cloud adoption continues to be a major force impacting organizations today. A 2020 McKinsey survey indicated that many organizations saw several years worth of digital transformation take place in 2020.

Developing Secure Web Applications: 6 Best Practices
Blog

Developing Secure Web Applications: 6 Best Practices

Developing Secure Web Applications: 6 Best Practices

When businesses think about maintaining cybersecurity, the first thing that comes to mind is often endpoint and network security. However, web application security is becoming increasingly important. There have been numerous high-profile attacks on web applications in recent years; in 2020, for instance, the Twitter accounts of famous people were compromised as part of a bitcoin scam.

Is DocuSign HIPAA Compliant?
Blog

Is DocuSign HIPAA Compliant?

Is DocuSign HIPAA Compliant?

Historically, processing claims, forms, and legal documents was an expensive and time-consuming affair that took place over fax and mail. DocuSign is one of the oldest companies in the electronic document processing space.

Nightfall’s data protection & classification platform enables SOC 2 compliance
Blog

Nightfall’s data protection & classification platform enables SOC 2 compliance

Nightfall’s data protection & classification platform enables SOC 2 compliance

Security teams that work in highly regulated industries or build solutions for consumers must adhere to compliance controls and regimes required for their business. One of the most important compliance requirements for many companies is the SOC 2 audit. The SOC 2 audit provides detailed information and quality assurance about essential security factors such as the confidentiality of data under your organization's stewardship, privacy controls, and many other standards.

ICYMI: 4 lessons for securing codebases from secrets exfiltration
Blog

ICYMI: 4 lessons for securing codebases from secrets exfiltration

ICYMI: 4 lessons for securing codebases from secrets exfiltration

Last month we hosted a webinar dedicated to discussing the issue of codebase security. As trends like secrets and credential exfiltration continue to be of concern within systems like GitHub, threats, such as cryptojacking and supply side attacks, have become more of a problem.

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform
Security

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform

Infosec leaders have a lot of corners to cover in their cybersecurity strategy. When crafting the tactics and onboarding the platforms that will protect sensitive information, the checklist of requirements could be missing a very important vector for attack, compliance risk or data loss: application logs.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.