Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Data security vs. network security: What should your business prioritize?
Guides

Data security vs. network security: What should your business prioritize?

Data security vs. network security: What should your business prioritize?

Here’s how to understand how working from home impacts your data security – as well as some steps to take to make sure you are prioritizing the right things.

4 Reasons Why the OSI Model Still Matters
Security

4 Reasons Why the OSI Model Still Matters

4 Reasons Why the OSI Model Still Matters

We’ll cover four key reasons why the OSI model still matters and how you can operationalize it in today’s world.

Why Your Org Needs DLP for Slack: Promoting Everyday Data Protection
Guides

Why Your Org Needs DLP for Slack: Promoting Everyday Data Protection

Why Your Org Needs DLP for Slack: Promoting Everyday Data Protection

Here’s the first part of a series of ways DLP for Slack supports many essential cybersecurity initiatives for everyday safety, like staying in compliance, detecting unstructured data, and more..

How to Scan GitHub Repositories for Committed Secrets and other Code Snippets
Guides

How to Scan GitHub Repositories for Committed Secrets and other Code Snippets

How to Scan GitHub Repositories for Committed Secrets and other Code Snippets

In this post, we’ll go over the scope of the problem of secrets exposure as well as discuss the options you have for finding and removing secrets from GitHub.

4 Things to Know about Sharing Data Over Slack
Guides

4 Things to Know about Sharing Data Over Slack

4 Things to Know about Sharing Data Over Slack

Slack security is achievable: take these steps to protect your company’s PII and data while using Slack.

Scan Pull Requests for Credentials & Secrets with the Nightfall DLP GitHub Action
Guides

Scan Pull Requests for Credentials & Secrets with the Nightfall DLP GitHub Action

Scan Pull Requests for Credentials & Secrets with the Nightfall DLP GitHub Action

Nightfall’s DLP platform is now available in the form of an open-source GitHub Action to protect your secrets and sensitive data as an integrated part of your code review workflow.

These 4 Google Drive sharing and permissions settings can prevent data loss
Security

These 4 Google Drive sharing and permissions settings can prevent data loss

These 4 Google Drive sharing and permissions settings can prevent data loss

Cloud infrastructures like Google Drive must be secured to protect data while preserving the best user experience possible. Here are four concepts to understand about Google Drive’s sharing and permissions settings that can help save your organization from a major data loss or breach event.

Why Candidate Experience Makes a Difference for Your Company’s Success

Why Candidate Experience Makes a Difference for Your Company’s Success

Why Candidate Experience Makes a Difference for Your Company’s Success

Here are a few questions to ask internally when creating your candidate experience and improve your chances at adding the right people to your organization.

6 questions to ask for protecting student data in distance learning
Security

6 questions to ask for protecting student data in distance learning

6 questions to ask for protecting student data in distance learning

Tech and security decision makers working to protect schools should ask six main questions to diagnose their organizations’ readiness to move instruction online, identify gaps, and find solutions to their most pressing issues in student data security.

8 Ways COVID-19 is Impacting Cloud Security
Security

8 Ways COVID-19 is Impacting Cloud Security

8 Ways COVID-19 is Impacting Cloud Security

We put together a list of eight ways COVID-19 is making an impact on common things we use and interact with every day.

5 Common Accidental Sources of Data Leaks
Security

5 Common Accidental Sources of Data Leaks

5 Common Accidental Sources of Data Leaks

This list of five common sources of accidental data leaks will help you identify the problems that could be lurking in your systems, apps, and platforms. Use these examples to prepare tighter security controls and keep internal problems from becoming major issues across your entire organization.

4 Reasons Why “Pets Versus Cattle” Still Matters in Cloud Security
Security

4 Reasons Why “Pets Versus Cattle” Still Matters in Cloud Security

4 Reasons Why “Pets Versus Cattle” Still Matters in Cloud Security

Here’s four reasons why the barnyard-sounding metaphor still persists in the memories of devops teams around the cloud security world, and how organizations can adopt these foundational ideas for more efficient cloud operations.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.