Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2021

Data Security Explained: Challenges and Solutions

Data is the most valuable asset for any business. No matter what industry you are in, it’s critical to take care of your data, whether it is financial reports, healthcare records or a start-up business plan. Despite increased data protection regulation, data breach risks are growing. According to Capita, 80% of data breaches involve personally identifiable information at a cost of $150 per record.

Nightfall's data protection & classification platform enables SOC 2 compliance

Security teams that work in highly regulated industries or build solutions for consumers must adhere to compliance controls and regimes required for their business. One of the most important compliance requirements for many companies is the SOC 2 audit. The SOC 2 audit provides detailed information and quality assurance about essential security factors such as the confidentiality of data under your organization’s stewardship, privacy controls, and many other standards.

Is Microsoft Teams HIPAA Compliant?

Microsoft Teams, and subsequently Microsoft, likely need no introduction. The popular collaboration tool launched in 2016, providing organizations with a powerful way to communicate and share information within the Microsoft ecosystem. Tools like Teams have only become more important post-COVID with teams being hybrid, decentralized, and distributed.

What is Data Leakage? Data Leak Prevention Tips

Data leaks can happen in many ways, and they’re surprisingly common. For example, a company might be hacked by cybercriminals; someone may lose their laptop with sensitive information; employee records could get lost during the relocation process. It doesn’t take much for sensitive information to get into the wrong hands. In fact, research has found that more than half of all data leakages come from human errors like typos and lost files.

ICYM: 4 lessons for securing codebases from secrets exfiltration

Last month we hosted a webinar dedicated to discussing the issue of codebase security. As trends like secrets and credential exfiltration continue to be of concern within systems like GitHub, threats, such as cryptojacking and supply side attacks, have become more of a problem. This makes understanding key aspects of codebase security very important. That’s why we pulled out 4 lessons from our recent session that developers and security engineers must know.

GitHub DLP Webinar - Examples of Codebase Data Breaches (Part 2)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe provides detailed examples of secrets leaks and exfiltration that occurred on GitHub. These incidents illustrate the risk of not just exposing cloud systems but stakeholder information as well.

GitHub DLP Webinar - Modeling the SaaS Threat Landscape (Part 3)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe illustrates the risk SaaS systems like GitHub pose by providing a model of the SaaS threat landscape. In this model, he explains how fundamental aspects of SaaS systems can lead to increased security risks if not taken into account.

GitHub DLP Webinar - Best Practices for Securing Codebases (Part 4)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI CTO and co-founder Rohan Sathe shares 8 critical best practices that developers and security engineers must keep top of mind in order to protect secrets in codebases and maintain good DevSecOps.

The NIST Cybersecurity Framework: Security Checklist And Best Practices

The National Institute of Standards and Technology (NIST) is part of the US Department of Commerce and was founded in 1901. NIST was originally established to help the U.S. industry become more competitive with economic rivals and peers, such as the UK and Germany. NIST prioritizes developing measurements, metrics, and standards for technology used in different industries.

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform

Infosec leaders have a lot of corners to cover in their cybersecurity strategy. When crafting the tactics and onboarding the platforms that will protect sensitive information, the checklist of requirements could be missing a very important vector for attack, compliance risk or data loss: application logs.

Preventing data loss in data warehouses with the Nightfall Developer Platform

Data warehouses power your data analysis and business intelligence operations so you can level up your knowledge and progress toward bigger business goals. Like any key component of your tech stack, using data warehouses effectively also requires care and caution — especially when uploading and sharing sensitive information.

Deploying Rubrik Cloud Cluster from the AWS Marketplace

Deploying a Rubrik Cloud Cluster on AWS has never been easier! Watch this video to learn how you can utilize the AWS Marketplace to easily deploy a fully configured 4 node Rubrik cluster in the cloud. Running Rubrik data management software in the cloud enables many features such as backup of Cloud Native NAS filesystems, VMC on AWS protection, point-in-time recovery of SQL, Oracle or SAP Hana and much more...

GLBA Compliance Checklist: Keeping Financial Data Safe And Secure

GLBA compliance isn’t something to take lightly. These measures are strictly enforced by the Federal Trade Commission (FTC). In 2018, for instance, Venmo and its parent company PayPal reached a settlement after complaints about the company’s handling of privacy disclosures. The peer-to-peer payment app had 150 days to adhere to GLBA compliance, or it faced fines of up $41,484 per violation.

Five key points to consider for implementing a successful EDRM Project

As the corporate boundaries expand, the traditional perimeter-based security measures may not be sufficient to protect a company’s sensitive data. To address the growing threat landscapes, there is a need to protect data throughout its lifecycle be it at rest, in transit, or in use.

Demoing the Netskope and Mimecast DLP Integration

Protecting the data of an organization is a complex task. Data is the crown jewel of any organization which the adversaries continuously seek to get their hands on. Data is threatened both by external attackers and internal threats. Sometimes the threats are malicious, and in many cases, they are accidental. Both these cases have to be addressed by modern enterprise security departments.

How do businesses ensure data security with a remote workforce?

When it comes to Data protection, we used to talk about securing the perimeter with firewalls, VPNs, cybersecurity training for employees, to prevent data leaks - remember those days?? Well, these days, things are a little different as we now have remote working to contend with. As a result, Zero Trust has crept in and tilted the formula for Data security and securing network perimeters is no longer effective.

Protecting and Managing Microsoft 365 Data

Microsoft 365 provides tools to assist with compliance, but they don’t provide native backup and recovery - they recommend customers backup their data with third-party applications. Rubrik’s SaaS-based approach to data protection for Microsoft 365 ensures critical data is secured, easily discoverable, and always accessible.

Enable Your Journey to the Cloud

Today, data is growing faster than ever, and so should your business plans! Learn about the benefits of cloud storage and how with Rubrik you can seamlessly manage and protect your data while accelerating your cloud adoption, simplifying archival, streamlining app migration, and unifying data protection across multi-cloud and hybrid migration. Rubrik will help your enterprise drive resiliency at the point of data and give back control and visibility.

Automate and Integrate with Rubrik APIs

Managing a large distributed environment can get busy. Rubrik has created a comprehensive API that can be integrated with any other system or workflow to ensure consistency and save you time. This allows you the flexibility to leverage pre-made integrations or custom-build your own. APIs can be used to avoid long wait times and ticket overflow, and empower users to assign SLAs, perform restores or monitor backups.

Protecting Your Online Privacy: Three Levels of Security

Data leaks happen once every few months at least. Millions of users can have their phone number, address, and Social Security Number smeared across the internet in a matter of seconds. Your online browsing behavior is also sold legally by tech companies to the highest bidder. Ever seen an ad that is a little too specific? Most major tech companies rely on some form of data harvesting for revenue. As consumers, should we do anything? Can we do anything?

How should databases be protected?

There’s simply no denying that Data is the currency of the future. All businesses have one or more databases and are naturally heavily reliant on them not only to store information, but also to utilise the data to make business informed decisions. Whether it’s payroll data, employee records, customer information, financial information or even inventory data today’s list of Data is endless.