Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Announcing the Nightfall Developer Platform - APIs for Building Data Protection into Any Application

Nightfall’s vision is to power data protection in every app or service. Our native SaaS integrations for apps like Slack, GitHub, and Google Drive already protect organizations, ranging from small startups to the Fortune 100, against data leaks with our machine learning-powered detection engine. Today, we’re excited to announce the launch of the Nightfall Developer Platform, so you can build data discovery, classification, and protection using our powerful APIs.

4 Components of Modern Data Classification & Protection Infrastructure

Data privacy is top of mind for every organization, with individuals wanting reassurance that their data is secure at all times. With the ever increasing number of cloud applications on the market today, security teams are faced with the challenge of keeping track of compounding volumes of sensitive data that can flow internally, externally, and across systems.

A Definitive Guide to Security Analytics

Security analytics has become an increasingly popular field as more and more organizations take a different tact to cybersecurity. Historically, IT teams focused on prevention and protection, but today’s priority is detection. Hackers tend to use a wide range of ever-changing tools to exploit vulnerabilities. It can feel like whack-a-mole to constantly try to defend against evolving threats.

Securing legacy systems and protecting your Data

If you ask the question “who is responsible for a company’s cybersecurity,” the answer you’ll most likely hear is no longer the CTO, or the IT department, but instead the CEO. In fact, Gartner believes that 75% of CEOs will be held personally liable for cyber and physical breaches by 2024. That means there’s no more passing the buck on this complex issue.

Welcome to Nightfall's Engineering Blog

From our beginnings as childhood friends to coming up together in the tech industry, Isaac and I would catch up on our adventures as professionals working in Silicon Valley: him in the VC world, and me as an engineer at Uber Eats. We’re both very interested in entrepreneurship, so we would always come back to discussing various business ideas, including a topic we’d both become intrigued with — the existing challenges enterprises faced with cloud data security.

4 Ways to Automate Controlled Access to Sensitive Data

Controlling access to sensitive data is tough. Be too restrictive, and your employees run into too many roadblocks to do their jobs effectively. Too loose, and you are effectively guaranteeing that your organization will find itself on the front page as a victim of one of the many data breaches happening every day. That is why it is important to craft an effective data security strategy: one that relies on automation and oversight to ensure the privacy of your users’ data.

A Better Approach to Data Privacy with Truyo and Egnyte

If you receive a Data Subject Access Request (DSAR) today, what will you do? How does your organization respond to a request from a customer who wants to know what personal data you have and how you use it? What if a customer requests the “right to be forgotten”? How do you know you have deleted every instance of personal data from all locations in your company? Will you be able to respond quickly and completely?

What is Data Protection by Design?

‘Privacy by design’, or as it’s now known, ‘data protection by design and default’, refers to Article 25 of the UK GDPR. This principle makes it a legal obligation for controllers to implement organisational controls which ensure data protection issues are addressed at the design stage of any project. But what does the regulation mean when it refers to organisational controls?

Simulating Filesystem with Billions of Files: Part 1

Rubrik can gracefully backup hosts with petabyte-scale filesystems containing around a billion files. It took us focused effort and innovation, both in scaling existing systems and verifying the changes work before shipping to our customers. One of the innovative systems that helped us achieve this scalability is the FileSystem Simulator.

Cloud Threats Memo: Manage Your Leaky Public Cloud Misconfigurations

A new day, a new wave of S3 leaks… Cloud misconfigurations continue to be a major concern for organizations and a constant source of data leaks. A recent report by IBM has revealed that misconfigurations are behind two-thirds of cloud security incidents.