Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2023

The ultimate guide to cloud DLP for GenAI

How many of us use ChatGPT? And how many of us use SaaS applications as part of our daily workflows? Whether you know it or not, if you use either of these tools, your data has likely traveled beyond the boundaries of your “fort.” What do I mean by “fort,” exactly? For this guide, consider your “fort” to be somewhere where you can monitor and secure your data. When data leaks outside your “fort,” it presents a myriad of possible risks.

The Fundamentals of Intrusion

No matter the size of your business, there are assets and data you have on your premises that you need to keep secure from people outside of your organisation. Whether it’s hard copies of personnel data, server rooms, or safety-critical infrastructure, that information, or how to gain access to that information will likely have some value to bad actors willing to use or exploit it.

Nightfall named a 2024 leader in Data Loss Prevention (DLP)

It’s official: Nightfall has been named as a leader in Data Loss Prevention (DLP), data security, and sensitive data discovery by G2’s peer-reviewed marketplace. At Nightfall, our goal is to help customers to discover, classify, and protect their sensitive data across the cloud.

Nightfall's new GenAI detectors are revolutionizing the cloud DLP landscape. Here's how.

Nightfall AI is excited to announce a new generation of detectors powered by generative AI (GenAI). Read on to learn more about recent advancements in our PII, PHI, secrets, and images detectors—as well as how they stack up against competitors like AWS Comprehend, Google DLP, and Microsoft Purview.

Understanding precision, recall, and false discovery in machine learning models

There are various ways to measure any given machine learning (ML) model’s ability to produce correct predictions, depending on the task that the system performs. Named Entity Recognition (NER) is one such task, in which a model identifies spans of sensitive data within a document. Nightfall uses NER models extensively to detect sensitive data across cloud apps like Slack, Microsoft Teams, GitHub, Jira, ChatGPT, and more.

What is data-centric security?

Data is the lifeblood of organizations. It drives decision-making, fosters innovation, and underpins business operations. However, this wealth of data is scattered across multiple cloud platforms, making it an attractive target for cybercriminals, and rendering traditional approaches to data protection obsolete. This is where data-centric security comes into play. This article will explore the concept of data-centric security, why businesses need it, and the benefits it offers.

Protecting Sensitive Data with Egnyte in Today's Threat Environment

In light of recent attacks against on-premises file server appliances affecting organizations of all sizes and industries, it has become clear that, in many cases, companies would be better suited to choosing cloud solutions for their secure data management needs. There are many great products on the market capable of providing easy access to files persisted in your local network.

What is Data Governance?

As the importance of data continues to grow, and the amount of data being processed by organizations grows further, many organizations are beginning to feel the constraints and demands of compliance. Therefore this makes data governance paramount to guarantee the security, accuracy, availability, and usability of your data. Data governance encapsulates the approach to managing data during its lifecycle, from acquisition, to use, to disposal.

How Secure is your Engineering Data?

The manufacturing industry has undergone a huge digital transformation in recent years. While these changes have increased productivity, the industry has also experienced new pressures from cybersecurity. In 2022, the industry has been vulnerable to 250 data violation incidents in the United States alone costing nearly 23.9 million USD. More and more industries are finding their intellectual property (IP) at risk as threat actors become more sophisticated.

Adding Multiple Watermarks to Protect IP in Microsoft Office Documents

Protecting intellectual property (IP) and trade secrets is critical to a company’s bottom line. Keeping IP and sensitive business-critical information within the confines of the company and its employees is not always possible, especially in the manufacturing industry. Vendors must often share previews of new products with retailers and distribution partners before release.

Maximizing Efficiency: The Significance of TDM for Sensitive Data

Organizations dealing with sensitive information must prioritize Test Data Management, a critical practice in the era of data-driven operations. The importance of precision in handling sensitive data cannot be overstated. This article explores the key reasons why utilizing Test Data Management (TDM) for sensitive data is not just beneficial but imperative for ensuring smooth operations and minimizing risks.
Featured Post

Looking to 2024: Data, AI and security will be top priorities for businesses

The technology landscape has evolved significantly over the last year with the introduction of technologies such as ChatGPT and other generative AI tools taking the market by storm, while raising concerns about data security and more. As we move forward into 2024, we anticipate that the impact these new technologies have made this year means they will continue to pave the way forward, with AI remaining a hot topic in the industry, while data security concerns rise around it.

7 Effective Security Measures to Combat Cyberterrorism

Cyberterrorism exists, but it is a concept that is difficult to pigeonhole. The story is similar to “physical terrorism,” where there are always shades of gray to consider – Was something an act of terrorism, or was it just an act of gratuitous malevolence? Many acts of terrorism are definable, and the same applies to cyberterrorism. However, the blurring of the lines is even more apparent with cyberterrorism.