Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2024

Top 10 Tips for Creating a Data Loss Prevention Policy

Not long ago, most company resources were located within a defined perimeter and users worked in the office using company-owned devices. In that world, access-centric security policies were enough to safeguard sensitive data. But most organizations have now adopted a host of cloud applications, and users work from anywhere on any device and network. To secure sensitive data in this new setup, organizations must transition from an access-centric approach to a data-centric security approach.

The Importance Of Call Recording Security

In today's rapidly evolving digital landscape, the way we communicate has transformed dramatically. The ability to forge and sustain social connections globally is a remarkable advancement. However, the issue of online privacy continues to be a significant challenge for both individual users and businesses.

5 Best Ways To Secure Your Brand's Reputation Online In 2024

You know the moment when you are in a different city and want to find a good restaurant, or even the new one in your neighborhood? This is probably something that all of us have experienced at some point in our lives. I always do the same - I take out my phone and check the reviews. It can be overwhelming how much a few bad comments can sway my opinion. And that's the power of online reputation.

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

In July 2022, the Pentagon’s acquisition office issued a memo reminding acquisition officials of the DoD’s requirements for handling controlled unclassified information (CUI). The standard which applies to Defense contractors is not new. The original Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 requirement went into effect in 2017.

Fortifying Your Systems: 8 Construction Management Software Security Tips

You can't afford to build on shaky ground in the digital world. Your construction management and accounting software is at risk if it isn't secure. Protecting your business data is also about safeguarding your reputation. So, examine these eight essential security tips to help you fortify your defense, keep your software up-to-date, and ensure you're always ahead of cyber threats.

Nightfall AI: AI-Powered Data Leak Prevention (DLP) for the Enterprise

Data leak prevention (DLP) has become a critical tool for securing the modern enterprise. Think of popular workplace apps like Slack, Salesforce, Google Drive, M365, ChatGPT, and more; these apps have revolutionized workplace productivity, but they’ve also provided new pathways to spread sensitive data and risk compliance. This is where DLP solutions come in. However, legacy DLP relies on rules and heuristics, which overload security teams with false positive alerts and slow the remediation process to a grinding halt.

Nightfall Sensitive Data Protection for Email

Leverage Nightfall’s AI-native platform to pinpoint and protect PII, PCI, PHI, secrets, and credentials across SaaS and email, including Gmail. Built with AI at the core, Nightfall Sensitive Data Protection is transforming email DLP by helping security teams to… … detect sensitive data with 2x better precision and 4x fewer false positive alerts. … act swiftly by blocking or quarantining emails, or removing attachments that contain sensitive data.

Nightfall Data Exfiltration Prevention

Nightfall Data Exfiltration Prevention uses generative AI to discover sensitive data and monitor data movement across SaaS apps like Google Drive. Nightfall’s enterprise-grade data leak prevention platform offers several key benefits, such as… … complete coverage across SaaS apps and managed endpoints. … enhanced detection accuracy, leading to 4x fewer false positive alerts. … streamlined workflows, so security teams can monitor data movement and take action from within a single user-friendly console.

Nightfall SaaS Security Posture Management (SSPM)

Nightfall SaaS Security Posture Management (SSPM) offers real-time visibility into permissions and sharing settings to prevent security posture drift. Nightfall leverages generative AI (GenAI) for a dynamic and responsive management approach to SaaS security posture, which means… … unparalleled visibility into sharing and permissions settings across SaaS apps. … enhanced detection accuracy, leading to 4x fewer false positive alerts.

Building a Robust Data Quality Management Framework: A Step-by-Step Guide

Maintaining data quality is crucial for any business that depends on dependable data. Without a structure in place, organizations run the risk of making decisions based on flawed or incomplete information. To uphold data integrity and make informed decisions businesses need to establish a data quality management framework. In this article, we will delve into the steps involved in constructing such a framework.

Here's what caused the Sisense data breach-and 5 tips for preventing it

From Uber in 2016 to Okta in 2023 to Sisense in 2024, it’s evident that there’s a pattern behind the tech industry’s most devastating breaches: Data sprawl. Let’s dive into how data sprawl played a part in last week’s Sisense breach, as well as how security teams can be proactive in defending against similar attacks.

What is the difference between Information Disclosure and Data Exposure

As digital infrastructure becomes increasingly integrated into every day operations across various industries, ensuring the security of sensitive information becomes crucial for safeguarding both individuals and organizations from cyber threats. In the vast landscape of cybersecurity risks, two terms stand out: information disclosure and data exposure. Understanding these concepts is vital, as they can significantly impact trust and lead to potential repercussions.

The role of DDI solutions in optimizing smart manufacturing network infrastructures

The Fourth Industrial Revolution, or Industry 4.0, has integrated digital technologies such as the Industrial Internet of Things (IIoT), operational technology, and information technology into the heart of manufacturing.

How Next DLP Automates Data Breach Investigations with Torq Hyperautomation

The following is adapted from a conversation between Torq and Robbie Jakob-Whitworth, Cybersecurity Solutions Architect at Next DLP. Next DLP is a leading provider of insider risk and data protection solutions. Read on to learn how Robbie has used Torq Hyperautomation to automate alerts and reduce alert fatigue within his organization.

Secure Your Staff: How to Protect High-Profile Employees' Sensitive Data on the Web

Organizations are increasingly concerned about high-profile employees’ information being exposed on the deep and dark web. The CrowdStrike Counter Adversary Operations team is often asked to find fake social media accounts and personally identifiable information (PII) that might be exposed. Impersonations and leaked PII can unravel lives and ruin the reputations of individuals and their organizations.

Redact sensitive data from your logs on-prem by using Observability Pipelines

As your business evolves to serve more users, your applications and infrastructure will generate an increasing volume of logs, which may contain sensitive data such as credit card numbers, IP addresses, and tokens. When you collect sensitive data, you may be subject to laws such as GDPR—which restricts the transfer of personal data across borders, and you may face legal consequences if this data is exposed outside your infrastructure.

What is Sensitive Data: How to Protect Important Personal Data

Sensitive personal data is among the most valuable information attached to us; it’s so valuable that there are international regulations for its maintenance, storage, and management. It is data that contains essential details about us, like Social Security Numbers (SSNs), bank accounts, tax IDs, health insurance data, and all the other “unique-to-one” credentials.

20 Causes of Data Loss Threatening Businesses in 2024

Data is not just a strategic asset. It’s the lifeblood of your organization. Losing access to any strategic asset can threaten an organization’s viability; without plants and equipment, manufacturers would find it difficult to succeed, and service providers can’t operate without brand recognition. Similarly, without data, your organization could be left in a state of complete and utter paralysis, unable to function or recover.

The Top 9 Data Exfiltration Prevention Solutions in 2024

With the growing dependence of businesses on digital platforms for storing and processing sensitive information, the threat of data exfiltration has become a pressing issue. The evolution of exfiltration techniques has given rise to threat actors who exploit insecure devices and engage in suspicious activities to steal valuable data. These activities often involve unauthorized physical access or social engineering attacks to obtain login credentials with malicious intent.

Fax vs. Secure File Transfer: A Guide to Choosing the Right Method

Amid rising concerns over cybersecurity due to recent significant breaches, a number of institutions have surprisingly resorted to the fax machine for transmitting confidential data. This move may appear unconventional in an age where email encryption has seen substantial improvements. It naturally raises the inquiry: does fax boast superior security compared to email?

Nightfall AI: The First AI-Native Enterprise DLP Platform

Legacy DLP solutions never worked. They're point solutions that generate an overwhelming number of false positive alerts, and block the business in the process. But no longer. Enter: Nightfall AI, the first AI-native enterprise DLP platform that protects sensitive data across SaaS, generative AI (GenAI), email, and endpoints, all from the convenience of a unified console.

The Secret Cipher: Modern Data Loss Prevention Solutions

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. Far too many organizations place Data Loss Prevention (DLP) and Data Protection at the bottom of their priority list due to the perceived difficulty in its deployment. When there are in fact some easy approaches to getting started with protecting your data.

DLP Security: Benefits, Implementation, and Common Pitfalls

Regardless of the industry, the risks associated with data loss are significant. Financial services, healthcare, government, technology, and many other fields – all rely heavily on sensitive data. The Identity Theft Resource Center (ITRC) reports that the number of data compromises in the United States hit a record high of 1,802 in 2022. This emphasizes the alarming increase in data security incidents.

Nightfall named a "Data Security Solution of the Year"

We’re thrilled to announce that Nightfall was selected as the “Data Security Solution of the Year” in the 2024 Data Breakthrough Awards. With enterprises scrambling to stay on the cutting edge of innovation, it’s all too easy to lose sight of data stewardship. In addition to SaaS apps, email, and endpoints, now enterprises must also safeguard their generative AI (GenAI) applications, including both custom and third-party GenAI tools.

What is Policy Orchestration?

As an organization’s data volume grows, so does the need to manage its access and governance consistently and securely. The proliferation of vast and siloed data spread across diverse applications, multi-cloud and hybrid environments, and formats over the last few decades has made it difficult to control data access and governance. In order for structured data to be effectively utilized, it needs to be combined and enhanced in a way that supports both operational and analytical tasks.

The Definitive Guide to Endpoint Data Loss Prevention

Backup and recovery solutions, anti-malware tools, data encryption tools, and network security tools—how much protection is really enough to prevent endpoint data loss? In this article, we’ll go over everything you need to know about endpoint data loss prevention, including the types of DLP, specific activities you can monitor, how endpoint DLP software can help, and more.

Personal vs Sensitive Personal Information (SPI): What's the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation? The nuanced information about a person—including those elements listed above and more—falls into a data category called “personal information” or “personally identifying information” (PII).

10 Data Security Best Practices: Simple Methods to Protect Your Data

Data security is more important than ever because of an expanding cyber attack surface, frequent supply chain attacks, and evolving AI threats. The global average cost of a data breach reached an all-time high of $4.45 million in 2023, according to the 2023 Cost of a Data Breach Report by IBM Security. In this article, you’ll discover the main data security strategies and 10 methods of protecting data that apply to most industries.

Data Exfiltration: Risks, Detection & Prevention Strategies

Companies today face a wide range of potential threats to digital security. From cyber attacks with malicious intent to internal threats from negligent employees, IT and security teams face remarkable challenges in the modern enterprise environment. Add to the equation that many companies now operate under a hybrid model in which some employees may use personal devices for work purposes, and it’s exceedingly complicated to establish ironclad security policies and incident response plans.
Featured Post

Cloud computing - The first step to an effective data modernisation strategy

Many organisations realise the benefits that lie within the data they collect daily. This modern approach to data empowers businesses to leverage data for innovation and monetization while at the same time enhancing security and privacy. While this may seem like a conundrum as companies have traditionally buried their data deep into IT architecture to prevent it from being accessible, even by the employees, today it is possible to have the best of both. This process starts with the cloud.

Securing AI with Least Privilege

In the rapidly evolving AI landscape, the principle of least privilege is a crucial security and compliance consideration. Least privilege dictates that any entity—user or system—should have only the minimum level of access permissions necessary to perform its intended functions. This principle is especially vital when it comes to AI models, as it applies to both the training and inference phases.

How Product Security Helps To Protect Your Data at Egnyte

One of the critical challenges for organizations today is securing their data. Organizations must incur the cost associated with proper design, development, and maintenance of systems and their appropriate safeguarding and monitoring. One way to reduce and optimize these costs is to choose tools that operate in a Software-as-a-Service model. Choosing tools in such a model helps shift some of the responsibilities and costs to the vendor.

Firewalls for AI: The Essential Guide

As the adoption of AI models, particularly large language models (LLMs), continues to accelerate, enterprises are growing increasingly concerned about implementing proper security measures to protect these systems. Integrating LLMs into internet-connected applications exposes new attack surfaces that malicious actors could potentially exploit.