Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2022

9 Best Data Leak Detection Software Solutions in 2022

Data leaks are a popular attack vector for cybercriminals. They’re considered a shortcut to accessing valuable sensitive data without needing to carry out sophisticated cyber attacks. Once an attacker discovers a data leak, they can exploit it immediately. Organizations must be vigilant against internal and third-party data leaks. Otherwise, they risk leaving an instant pathway to costly data breaches exposed.

5 Reasons Why You Need to Review Your Data Privacy Policy Now

‍ Without a doubt, data privacy will be a much bigger focus for small- and medium-sized businesses in 2023, as the U.S. states of California, Colorado, Connecticut, Utah, and Virginia all enact stricter privacy legislation. Similarly, the Canadian province of Quebec is also in the process of updating its data privacy laws.

Why Santa Claus Is a Huge Privacy Risk and Must Be Stopped at All Costs

He sees you when you're sleeping, and he knows when you're awake, and we're just supposed to be ok with that? He's making a list and checking it twice, but what kind of information is on that list? Does the big man in red store all the massive amounts of data he collects securely, or can all the elves peruse it at their leisure? Let's face it, Santa Claus is a huge security risk and a privacy nightmare. How does he get away with these massive breaches of your right to privacy year after year?

How Australia's Privacy Legislation Amendment impacts cybersecurity

Almost every day we hear of another data breach. There has been no shortage of headline-hitting breaches here in Australia, such as Medibank and Optus. The old-school method of ransomware encrypting any data it has access to and requesting a ransom for the decryption key to restore data has evolved. It is now a more insidious and far-reaching problem involving bad actors exfiltrating data and requesting a ransom to keep from exposing that data publicly.

Nightfall 2022 in Review: A Look at the Exciting Developments in the Past Year

The demand for cloud security continues to increase in the face of supply chain attacks affecting the security of hundreds of thousands of organizations on platforms like GitHub. These concerning developments are among the reasons why we’re building Nightfall and are top of mind as we pursue our vision of enabling data security everywhere in the cloud. 2022 has been a busy and exciting year for us here at Nightfall as we’ve built out the platform in response to these developments.

ISO 27001:2022 and the new requirements for Data Leakage Prevention

The ISO 27001 is one of the most recognized security standards for private sector organizations across the globe and is often required by prospective enterprise customers, helping organizations unlock new business opportunities. ISO 27001 was recently updated along with its companion guidance standard ISO 27002. The updated title for this standard is ISO/IEC 27001:2022 Information Security, Cybersecurity, and Privacy Protection.

10 Data Protection Tips for 2023

2022 has been a busy year in cybersecurity with some high-profile breaches taking over the headlines late in the year. From simple negligence to unpatched systems, phishing emails, hackers, and malicious insiders our systems and data remain vulnerable. It’s clear that despite our best investments in security training and technology there is still room for improvement in 2023.

Dark Data: What is it? How can you best utilize it?

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Data continues to be a valuable asset for an organization and plays a crucial role in making operational and strategic business decisions. With the growth of hybrid, private, and multi-cloud models, much of the data is stored on these platforms and becomes vulnerable to malicious activities and potential data leaks.

A New Approach to Data Security for the New Year

Over the last few years, we have seen more and more organizations moving into hybrid and remote working environments. With that change, IT teams have learned that they cannot trust the network like they have in the past. Using the internet, employees now have direct access to your organization's resources, circumventing traditional security tools like virtual private networks (VPNs) and firewalls.

Ransomware Statistics, Facts, and Trends of 2023

Ransomware is one of the most dangerous cyber attacks to businesses and consumers. This type of malware holds files and data hostage until a ransom is paid. Ransomware incidents can result in data loss, financial losses, and even ransomware payments. In order to protect your business from ransomware-based data breaches, it is important to understand ransomware statistics, ransomware trends, and the best practices for ransomware prevention.

How can Cyber Security Playbooks and Runbooks Benefit Your Security Program?

You probably don’t need anyone to tell you that, today, infosec and cybersecurity are challenging and fast-paced endeavors. In the last five years alone, we’ve seen a myriad of industry altering developments — from an ever expanding universe of privacy compliance legislation and the permanent entrenchment of hybrid and remote work, to growth in the size and scope of data breaches — the world of security has proven ever complex and ever-shifting.

How does VPN Security help in Data Security & Privacy?

Today in a technology-driven business world, network security is an utmost priority for all businesses, especially for those dealing with sensitive data. More so, in an organization that works in a hybrid environment wherein information and critical data are accessed remotely, the need for securing such data and network is important. This has led to a paradigm shift in the approach of establishing a robust security program and security implementations within the organization.

2022 in Review: 4 Lessons We've Learned from 2022's Largest GitHub Breaches

2022 revealed that security challenges remain for organizations leveraging GitHub. Between supply chain attacks, API key leaks, and other security risks, there are plenty of lessons and takeaways from this year’s GitHub-related headlines. In this post, we’ve rounded up and categorized the year’s largest GitHub stories. Read on to learn more about the types of security risks occurring in GitHub and the lessons you’ll want to take with you into 2023 and beyond.

Using Snyk reporting for data-driven security

Last month, we announced the open beta of Snyk’s new and revamped reporting. Since then, we’ve been amazed at how creative our customers have been in leveraging these new capabilities to answer all sorts of different security questions. We’re not surprised. The new reporting was designed to provide easy access to data across the Snyk platform (including Snyk Code!), and to give customers flexible analysis tools to slice and dice data as they see fit.

4 Expert Tips for Data Center Security

In a market projected to grow to $288.30 billion by 2030, data centers will expand to facilitate more data-driven workloads, including AI and big data. Much of this expansion continues to occur in the cloud, as companies seek to reap the benefits of low-cost infrastructure that they can spin up as needed. In fact, research shows that cloud workloads represented 94% of all data center workloads worldwide in 2021.

Cryptojacking Attacks See Growth Despite Weak Year for Cryptocurrency

2022 has seen a slowdown for the cryptocurrency ecosystem, as well as a decrease in demand for cryptocurrency-related activities like cryptomining. Even before the catastrophic implosion of the FTX cryptocurrency exchange, multiple market bubbles (from failed exchanges other than FTX) and events like Ethereum’s highly anticipated transition from proof of work to proof of stake have dampened enthusiasm for cryptocurrencies.

How Enterprise Efficiency & Cybersecurity Go Hand-in-hand

Without cybersecurity, your organization is vulnerable on many fronts, making it a crucial part of your business operations. But let’s be honest. Everyone knows that cybersecurity can be a cost center and can slow down business processes. That’s why it is important to select and implement data security solutions. These solutions should not only protect your organization but also enable faster, more effective operations, and strategic planning to achieve quarterly and YoY goals.

5 Consumer Data Protection Tips For Your SaaS Business

SaaS (Software as a Service) companies cannot function without certain consumer data. For starters, you’ll need the customers’ names and email addresses for your marketing and sales operations. And as leads turn into customers, you may also need their payment details. Now, as your company collects more consumer data, it also becomes a target for data breaches. Remember the March 2022 HubSpot security incident?

The Essential Guide to Data Loss Prevention (DLP) in Jira

The Atlassian ecosystem provides thousands of companies with the ability to collaborate remotely through powerful, feature-rich SaaS applications like Jira. As such tools become the norm across companies, big and small, the amount of sensitive information stored in these systems will increase. This means that organizations need to prioritize minimizing the risk of exposure within cloud environments.

The Essential guide to Data Loss Prevention in Confluence

The Atlassian ecosystem provides thousands of companies with the ability to collaborate remotely through powerful, feature-rich SaaS applications like Confluence. Over the least year, the rise of remote work has meant many companies have hosted their internal information hubs on Confluence. As such tools become the norm across companies, big and small, the amount of sensitive information stored in these systems will increase.

The Essential Guide to Data Protection & Security with the Nightfall Developer Platform

The last decade has seen a dramatic rise in data breach risk, with data breach incidents increasing nearly 840% between 2005 and 2019 according to the Identity Theft Resource Center. In this guide, learn about the growing problem of sensitive data exposure and how to use the Nightfall Developer Platform to easily build tools to identify and remediate this problem.

Save Your Data and Your Sanity

I recently read a technology forum post where a system administrator described symptoms of post-traumatic stress disorder after their company was attacked by ransomware. The recent State of Data Security report from Rubrik Zero Labs even found that 96% of individuals suffered emotional or psychological impacts as a direct result of experiencing a cyberattack.