Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Security in the Digital Age: How Fax Apps Ensure Confidentiality and Compliance

Where data breaches and privacy concerns are rampant, ensuring the confidentiality and compliance of sensitive information is paramount. From healthcare to finance, legal to government sectors, organizations grapple with the challenge of safeguarding data while adhering to regulatory requirements. Amidst the plethora of communication tools available, fax applications emerge as stalwart guardians of security, offering a robust solution for transmitting sensitive information securely. In this article, we delve into the world of fax apps, exploring how they bolster confidentiality and compliance in the digital age.

Nightfall Named A Leader in Data Loss Prevention (DLP) by G2

Nightfall has been named a Leader in Data Loss Prevention (DLP), Sensitive Data Discovery, and Data Security in G2’s Spring ‘24 reports. We’d like to extend a huge thank you to all of Nightfall’s customers and supporters for making this possible. We’re also happy to acknowledge the Nightfall team’s tireless innovation, all in pursuit of helping customers to secure their sensitive data across SaaS apps, GenAI tools, email, and endpoints.

Falcon Data Protection Preventing GenAI Data Loss: Demo Drill Down

Though GenAI is a great productivity tool, many organizations risk losing sensitive data. CrowdStrike Falcon® Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach in making GenAI safer for organizations. In this demo, see how easy it is to stop sensitive data from leaking into web-based GenAI tools like ChatGPT.

Why We Should Probably Stop Visually Verifying Checksums

Hello there! Thanks for stopping by. Let me get straight into it and start things off with what a checksum is to be inclusive of all audiences here, from Wikipedia : “A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.”
Featured Post

Harnessing the value of data with data monetisation

Businesses around the globe are using new technologies to change the world. But this wouldn't be possible without the use of sensitive data such as Personal Identifiable Information (PII) and Protected Health Information (PHI) to drive advancements in personalisation and sophistication. However, if companies are using data that typically is associated with medical records and insurance claims, this bodes the question, is personal data secure?

How Much is Your Data Worth?

In a world full of subscriptions, the idea is that if you are not paying for something, you are the product. Companies such as Google, Facebook, and Twitter earn huge revenue by collecting your data and selling it to advertisers, giving them access to your personal information. In return, you may receive targeted advertisements on your feed. However, the disadvantages far outweigh the advantages.

5 Expert Tips for Protecting Your Enterprise's Sensitive Data

ICYMI, Nightfall recently launched a suite of enterprise DLP offerings including Data Exfiltration Prevention, Data Encryption, Sensitive Data Protection for SaaS and Email, and SaaS Security Posture Management (SSPM). To celebrate our new offerings, as well as our sixth birthday, we took a moment to gather insights from investors including Ryan Nece, Enrique Salem, Maynard Webb, Frederic Kerrest, and Kelvin Beachum Jr.

Nightfall was built on AI. Here's how we're advancing our mission to scale data protection in the enterprise.

Back in 2018, Rohan and I founded Nightfall on the belief that AI could make data leak prevention (DLP) better, faster, and more accessible to every enterprise. At the time, Rohan was a founding engineer at Uber Eats, and I was an investor at Venrock specializing in SaaS and security. From these respective vantage points, we could see that legacy solutions weren’t working, and could never keep up with the evolving threat landscape.

Understanding ITAR Compliance: A Guide for Australian Companies

The United States and Australian Governments have established strict regulations to safeguard the technology that can be used for military applications. The most sensitive technology is regulated by the U.S. International Traffic in Arms Regulations (ITAR), and it is imperative for any company working with ITAR-controlled technologies and data to comply with these regulations. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.

Backup basics: Ensuring data security in an uncertain world

In today’s digital age, where data is the lifeblood of businesses and individuals alike, the importance of backup and data protection cannot be overstated. Whether you’re a small business owner, a freelancer, or an everyday user of technology, the loss of critical data can have disastrous consequences. Let’s delve into why taking backups is essential and how robust data protection measures can save the day when disaster strikes.

Prevent security drift with Nightfall SaaS Security Posture Management (SSPM)

In order to prevent worst-case data leak and data loss scenarios, security teams need to have both proactive and reactive measures in place. Let’s explore this further with an example. Imagine your sensitive data as valuables within a house. There are multiple ways to secure that house, including the following. To put this example into practice, security teams would need to: The first and last of these bullet points fall under the umbrella of SaaS Security Posture Management, or SSPM.

What is Attribute-Based Access Control or ABAC?

One of the biggest issues facing government and industry is how to securely share sensitive and classified information. While information sharing and collaboration have tremendous benefits for productivity and service outcomes, they do come with risks. A dynamic, data-centric approach is key to securing sensitive information and achieving compliance.

Turning Insight into Action: Data Modernisation in Banking

Financial institutions are struggling to keep pace with technological advancements while ensuring data security and compliance with stringent regulations. Data modernisation has emerged as a critical strategy for banks to remain competitive, enhance customer experiences and fortify data security measures. In this blog post, we’ll discuss the importance of data modernisation in banking.

Navigating Data Privacy for GenAI in Customer Support

As the adoption of generative AI (GenAI) accelerates across enterprises, one of the most promising applications emerges in customer support. GenAI enables automated responses, allowing businesses to engage in natural conversations with customers and provide real-time chat support. However, this convenience comes with inherent risks, particularly concerning data privacy.

Nightfall AI releases GenAI-powered Sensitive Data Protection for the enterprise

The modern enterprise relies on hundreds of SaaS apps, email services, generative AI (GenAI) tools, custom apps, and LLMs, which often contain sensitive data. For too long, security teams have been forced to patch together point solutions for coverage across these channels, increasing their workloads and creating opportunities for sensitive data to slip through the cracks. This is precisely where Nightfall’s single-pane-of-glass solution comes into play: With Nightfall Sensitive Data Protection.

Iron Mountain Data Centers' Proactive Approach to Modern Threats with Rubrik

As a part of Iron Mountain Inc., a global leader in secure data and asset management trusted by 95% of the Fortune 1000, Iron Mountain Data Centers is uniquely positioned to protect, connect, and activate high-value customer data. Historically, Iron Mountain Data Centers took a defensive posture when it came to data security, focused on keeping bad actors out. Given the continually evolving nature of modern threats, the service provider had ambitious plans to elevate their cyber security platform, future-proofing their data security with Rubrik.

Nightfall AI launches data encryption and sensitive data protection for emails

Did you know that 41% of breaches involve email? For threat actors, cloud email systems like Gmail and Microsoft Exchange are treasure troves for valuable internal information like PII, PCI, PHI, secrets, and credentials. In order to limit the blast radius of privilege escalation attacks, and to remain in compliance with standards like HIPAA, it’s essential for enterprises to protect thousands of emails per day.

archTIS Recognized as a 2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer

archTIS is pleased to announce it is a Compliance & Privacy Trailblazer award finalist in the 2024 Microsoft Security Excellence Awards. The company was honored among a global field of industry leaders that demonstrated success across the security landscape during the past 12 months. We are extremely proud to be recognized as a finalist for the Compliance and Privacy Trailblazer award for the second year in a row.

Reduce insider risk with Nightfall Data Exfiltration Prevention

Nearly one third of all data breaches are caused by insiders. While you might immediately think of malicious insiders, like disgruntled or departing employees, insider risk can take numerous forms, including: From these examples alone, it’s easy to see just how prevalent insider risk really is. Whether it’s intentional or unintentional, insider risks often have the same consequences as external risks, including data leaks, data loss, noncompliance, and more.

Nightfall AI Transforms Enterprise DLP with AI-Native Platform

Nightfall AI today unveiled new capabilities to transform data security for the modern enterprise. The industry's first generative AI (GenAI) DLP platform now offers coverage for SaaS Security Posture Management (SSPM), data encryption, data exfiltration prevention and sensitive data protection. These products expand the company's existing suite of data leak prevention (DLP) solutions for protecting data at rest and in use across SaaS applications, GenAI tools, email and endpoints.

Local Insights: Navigating the Web With Indian Proxies

Sites and services in India can be difficult to access from outside because of the requirement for connections to originate from within the country. Although teleportation is not yet a reality, Indian proxies provide another means of circumventing geographically imposed limitations.

Australia's Cost of a Data Breach in 2024

Australia’s Data Privacy Landscape is EVOLVING QUICKLY In February 2023, the Australian government released the results of a two-year review of the 1988 Data Privacy Act. This was followed by a response in September, authored by Attorney General Mark Dreyfus, that agreed to 38 of the 116 recommendations and a further 68 ‘in principle’.

Nightfall expands its platform to meet modern enterprise DLP challenges

Legacy data leak prevention (DLP) solutions are failing. Simply put, they weren’t built for business environments rooted in SaaS apps and generative AI (GenAI) tools. Meanwhile, security threats are evolving at a breakneck pace, with as many as 95% of enterprises experiencing multiple breaches a year. New attack surfaces are unfurling at a rapid rate following the switch to hybrid and cloud-based workspaces.

Secure data is superior data: A security-first approach to the DoD Data Strategy

The US Department of Defense (DoD) has vast reserves of data, and the key to warfighter advantage is leveraging relevant data as a strategic asset to gain battlespace operational advantage, accelerating operational multi-domain decision-making at echelon scale.

U.S. Veteran Data Security: Third-Party Risk Management at the VA

The United States Department of Veterans Affairs (VA) is a federal agency that provides comprehensive healthcare services, benefits, and support to military veterans and their families. The VA operates a nationwide system of hospitals, clinics, and benefits offices focused on ensuring the health, welfare, and dignity of those who served in the United States armed forces.

CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security

I’m thrilled to announce CrowdStrike’s agreement to acquire Flow Security, a pioneer in data security posture management (DSPM) and the industry’s first and only cloud data runtime security solution. With this acquisition, CrowdStrike is setting the standard for modern cloud security with complete real-time data protection spanning endpoint and cloud environments, delivering the only cloud data protection platform that secures data both at rest and in motion.

FAQ: What Are the DoD Requirements for Wiping Data?

In today’s digital age, destroying data is not as easy as it once was. Before the advent of computers, if you needed to destroy sensitive government information to prevent it from falling into the wrong hands, all you often needed to do was light some papers on fire. With computers, you might think that it’s a simple matter. After all, if you’ve ever accidentally deleted a file or had a hard disk crash, you’ve probably lost data and haven’t been able to recover it.