Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2022

Australia and US Pledge More Government Cybersecurity Spend for 2022-23

In the midst of a growing global cyberthreat landscape, the Australian and US governments this week announced plans to increase spend to bolster federal cybersecurity. The Australian federal government’s newly released 2022-23 federal Budget has dedicated AU$9.9 billion to support cybersecurity and intelligence capabilities under a program called Resilience, Effects, Defence, Space, Intelligence, Cyber and Enablers (REDSPICE).

What is Data Encryption and Why It's Recommended for Really Safe Online Security

Encryption has come a long, long way over the last few years. Something once reserved only for militaries and governments, encryption has been made super accessible and has become standard practice in the tech industry. Whether it’s texts, photos, or word docs - it can, and should, be encrypted. Put simply, encryption scrambles any file sent or stored online into unreadable nonsense that can only be translated (or decrypted) by a user with a key.

Announcing Our Next Cloud-native Integration: Nightfall for Salesforce Enters Active Development

At Nightfall, our mission is to discover and secure sensitive data in every cloud application through a cloud-native, accurate, and performant platform. Since 2019, Nightfall has partnered with some of the world’s most innovative organizations to proactively eliminate data security risks across a fleet of SaaS applications via our native integrations for Slack, Atlassian Jira, Confluence, Google Drive, and GitHub.

15 Ways to Protect Data with Digital Security Watermarks

Everyday business documents continue to be one of the biggest sources of data leakage. The Facebook leaks and WikiLeaks are prime examples of the damage such breaches can wreak. Even with the best security tools in place users seem to always be able to find a way to circumvent security. Or, as in most cases, accidentally share data with the wrong audience creating a security issue.

Securing the Future of Data - A New Way to Think About Control

Control For decades it's been the mandate for enterprise security teams. Keep data secure. Lock it down. Restrict access. Put it behind firewalls. Don’t let it slip on to personal devices. But everything has changed. The cloud, SAAS, mobile workforces, an unstoppable wave of BYOD. Today, users and the applications they depend on are more widely distributed than ever. Networks are increasingly exposed. Cyber threats grow sophisticated by the minute.

Virtru Partners with Nightfall to Deliver Intelligent Email Encryption for Data Security & Compliance

We’re excited to announce that Nightfall is partnering with Virtru, a renowned leader in email and SaaS encryption, to provide customers with an encryption solution for securing PHI in Gmail and Google Drive. Combined with our existing Google Drive data loss prevention (DLP) integration, this new solution will provide fully integrated compliance and security coverage for Google Workspace.

Understanding The HIPAA Breach Notification Rule

HIPAA requires covered entities and business associates to secure protected health information (PHI). Failing to do so can result in steep fines and penalties. Some PHI breaches, however, are out of the organization’s control. Determined hackers can expose PHI, and employees can make mistakes — they’re only human, Despite training, rigorous security protocols, and constant monitoring, data breaches can happen.

Do You Know Where Your Data Is... And Where it is Going?

Considering the forensic-level attention to data residency that was paid in the early days of cloud, it’s interesting how little regard is now given to the matter. Explaining the many pitfalls of certain data residency challenges to fellow CISOs (and key stakeholders) and why real-time visualisations of data flow matter, is often an interesting exercise.

Microsoft 365 and Teams Secure File Sharing Tips

Microsoft 365 provides a powerful document management and collaboration platform. However, with so many applications available in the platform to store and share information internally and with external parties, such as partners, contractors and vendors, ensuring proper access and data security can be a challenge. In this blog we examine how to ensure secure file sharing in Microsoft 365 and Teams.

Tackling NCSC Guidance - Part 2 (Data Security)

In part one of this two-part blog series, we analyzed the UK National Cyber Security Centre’s (NCSC) guidance relating to backups and data protection. Now in this post, we will examine NCSC’s guidance around mitigating malware and ransomware attacks. Recall that NCSC, at present, provides information and practical guidance in various articles on its website rather than formal requirements or regulations.

7 Ways EDRM helps to address your data security challenges during collaboration

There is no doubt that digital transformation is changing the way people coordinate and work. While it is a blessing in many ways, as it keeps businesses and people connected by creating opportunities and easy exchange of information, it has also paved way for cybersecurity risks. Ransomware, Phishing, data breaches, denial-of-service attacks have become increasingly common and threaten businesses of all sizes.

HIPAA Compliance Checklist: A Quick Guide

HIPAA compliance requires covered entities and business associates to secure protected health information. Social Security numbers, medical record numbers, health plan beneficiary numbers, account numbers, and names of patients, relatives, or employers all must be secured from unauthorized access. The penalties and fines for HIPAA violations can be steep — in some instances reaching millions of dollars. And, HIPAA isn’t prescriptive about what it takes to be in compliance.

5 Most Common HIPAA Violations and Their Penalties

Those who work in the healthcare industry know: HIPAA compliance is often fiercely enforced by the Department of Health and Human Services, and penalties can be steep. “Each covered entity is required to implement safeguards to prevent the unauthorized disclosure of PHI. These safeguards will vary depending on the size of the covered entity and the nature of healthcare it provides, but the penalties for failing to safeguard the integrity of PHI can be extremely high.

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

The women of archTIS share their experience and wisdom as Women in Tech

In honor of International Women’s Day we once again asked the amazingly talented women of archTIS to share their insights as women in tech. This year our Finance and HR leads share their important roles in the company, experiences, and offer advice to young women considering a career in cybersecurity.

Role Based Access Control vs Attribute Based Access Control: Addressing Common Misconceptions

A dynamic, data-centric approach is key to securing sensitive information and achieving compliance in our modern world of hybrid IT solutions, but what are the differences between RBAC vs ABAC the two common access controls approaches? Over the last two years, companies have seen an expedited shift away from using traditional methods to access their data. With more employees working remotely, we find the security controls we have spent years refining are no longer adequate.

How to Set Up Fluent Bit and the Nightfall Filter Plugin

Sensitive data often makes its way into logs. Though most of the time unintentional, these incidents have the potential to do a lot of damage, as they usually involve exposure of API keys, passwords, and customer data that can give attackers access to critical business data or put companies at compliance risk. This is why it’s important for organizations to be proactive about securing their logs.

Nightfall and Hanzo Partner to Deliver World-Class Data Classification as Part of Enterprise e-Discovery

We’re pleased to announce that Nightfall is partnering with Hanzo, a best-in-class enterprise e-discovery and investigations platform. Hanzo’s offerings, now powered by Nightfall DLP, include Nightfall’s machine learning detectors as part of Hanzo’s core functionality.

How Nightfall is building the next generation of DLP

The current wave of digital transformation that has brought more and more businesses online has also introduced an unwelcome side effect: the surface area for attacks has ballooned. As individuals and businesses migrated their sensitive transactions into cloud applications, cloud service providers became responsible for providing high-fidelity data security.

CISO Insider - S3E3 - The DLP journey with Brent Lassi

Bluecore CISO Brent Lassi joins Chris Martinez on CISO Insider to chat about the many things he’s seen and learned and worked on over two decades in the cybersecurity industry. From founding one of the first application security companies in the world, to following the evolution of DLP over the years, to now working in a cloud-native world without a traditional perimeter and how these challenges led him to Nightfall, Brent has many stories to tell.