search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

Blog

Five Step Security Guide for Selling to Health Insurers

Five Step Security Guide for Selling to Health Insurers

In this blog post, we will discuss some essential cybersecurity requirements for selling to health insurers, including deploying cloud data leak prevention (DLP)

Blog

Essential Security Requirements for Selling to the Federal Government

Essential Security Requirements for Selling to the Federal Government

Learn about the essential cybersecurity requirements that businesses must meet to sell to the federal government.

Blog

How to Protect Your Data in Salesforce

How to Protect Your Data in Salesforce

Learn about the growing data security problem risk with Salesforce and how your organizations can overcome these challenges.

Blog

Six Key Security Risks of Generative AI

Six Key Security Risks of Generative AI

A deep dive into the six key security risks posted by Generative AI and the role of Data Leak Prevention (DLP) solutions in mitigating potential risks.

Blog

What is CI/CD Security? An Overview for Developers

What is CI/CD Security? An Overview for Developers

Implementing robust security practices is critical in protecting your organization's data and infrastructure. In this article, we will discuss essential aspects of data security within the CI/CD pipeline.

Blog

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?

In this post, we'll explore the different deployment modes of CASBs to help you determine if a CASB will work for you.

Blog

AI Sub-Processors Tracker for SaaS/IaaS

AI Sub-Processors Tracker for SaaS/IaaS

Enterprise data is already transmitting to systems like OpenAI via some of your favorite apps.

Blog

Defining Your Organization's Attack Surface: The 4 Types of Attack Surfaces

Defining Your Organization's Attack Surface: The 4 Types of Attack Surfaces

In this post, we’re going to cover four common types of attack surfaces and best practices for addressing the risks of each type.

Blog

Detecting and Preventing Corporate Credit Card Exposure

Detecting and Preventing Corporate Credit Card Exposure

Learn how to prevent the abuse, exposure, and sharing of corporate credit cards via collaborative SaaS applications.

Blog

How to Protect Customer Data in Zendesk

How to Protect Customer Data in Zendesk

Sensitive data proliferation continues to grow in Zendesk, learn how to secure your data and prevent breaches.

Employee Spotlight

Employee Spotlight: Michael Gugliotti - Director of Sales Enablement

Employee Spotlight: Michael Gugliotti - Director of Sales Enablement

Michael Gugliotti joins Nightfall as our Director of Sales Enablement. Mike's career has taken him on a rewarding journey that's combined his passion for education, with customer success, and sales.

Blog

Enabling Zero Trust Data Security through Security Awareness Education

Enabling Zero Trust Data Security through Security Awareness Education

In this post, we'll explore how improving employee security awareness can help companies implement zero trust data security principles

Popular Resources

No items found.

Getting started is easy

Start protecting your data with a 5 minute agentless install.

Get a demo