Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Zix Alternatives for Email Encryption and Data Security in 2024
Blog

Zix Alternatives for Email Encryption and Data Security in 2024

Zix Alternatives for Email Encryption and Data Security in 2024

Zix may not be the right email encryption and data security solution for every organization. Read on to learn more about Zix's top alternatives and competitors.

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl
Blog

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

The Disney breach is a wake-up call for any organization that may have secrets sprawled across their tech stack.

Nightfall AI vs. Google DLP
Blog

Nightfall AI vs. Google DLP

Nightfall AI vs. Google DLP

How does Nightfall stack up against Google DLP? Read on to find out.

8 Best Data Leak Prevention (DLP) Policies for Protecting Your Sensitive Data
Blog

8 Best Data Leak Prevention (DLP) Policies for Protecting Your Sensitive Data

8 Best Data Leak Prevention (DLP) Policies for Protecting Your Sensitive Data

These popular DLP policies are useful tools for protecting your sensitive data, preventing data exfiltration, securing your AI usage, and more.

Secure Your AI apps and data pipelines with Nightfall’s Firewall for AI
Announcement

Secure Your AI apps and data pipelines with Nightfall’s Firewall for AI

Secure Your AI apps and data pipelines with Nightfall’s Firewall for AI

Nightfall’s Firewall for AI acts as a trust boundary that protects sensitive company and customer data during every stage of AI model building and consumption.

Is Slack using your data to train their AI models? Here’s what you need to know.
Blog

Is Slack using your data to train their AI models? Here’s what you need to know.

Is Slack using your data to train their AI models? Here’s what you need to know.

With Slack’s AI training policy in the spotlight, it’s time to consider how you can take security for AI into your own hands.

What Happened in the Twitter Data Breach?

What Happened in the Twitter Data Breach?

What Happened in the Twitter Data Breach?

An in-depth examination of Twitter's most significant data breaches, the vulnerabilities exploited, and actionable security lessons for organizations.

Building your own AI app? Here are 3 risks you need to know about—and how to mitigate them.
Blog

Building your own AI app? Here are 3 risks you need to know about—and how to mitigate them.

Building your own AI app? Here are 3 risks you need to know about—and how to mitigate them.

From training to annotation to fine-tuning and beyond, here’s how a firewall for AI can help you stay secure as you build your AI model.

Okta Data Breach: What Happened, Impact, and Security Lessons Learned

Okta Data Breach: What Happened, Impact, and Security Lessons Learned

Okta Data Breach: What Happened, Impact, and Security Lessons Learned

A comprehensive examination of the Okta data breach, exploring the timeline of events, attack vectors, organizational impact, and critical security lessons for cybersecurity professionals.

5 things you need to know to build a firewall for AI
Blog

5 things you need to know to build a firewall for AI

5 things you need to know to build a firewall for AI

As organizations expand their use of AI apps, it's important to have a scalable data leak prevention (DLP) solution in place.

Top 5 SaaS misconfigurations to avoid and why
Blog

Top 5 SaaS misconfigurations to avoid and why

Top 5 SaaS misconfigurations to avoid and why

It’s essential to be proactive about managing your security posture across SaaS apps like Google Drive and Microsoft OneDrive. Read on to learn why—and how—you can do just that.

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.