Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Nightfall's New Console Provides Actionable Analytics & Centralized UI for Solving Data Security Risk

The Nightfall platform is a SaaS data protection platform already known for its high accuracy findings and analytics. Now, thanks to new features baked into the Nightfall Console, users will have enhanced analytics functionality through an elegant and easy to navigate dashboard interface. Watch the video demo below for a walkthrough of changes, or read the rest of the post to learn more.

HIPAA for Dummies: The Ultimate HIPAA Security and Compliance FAQ

Building a HIPAA-compliant security program is a very time intensive and demanding undertaking. It can also be confusing, as satisfying requirements like the HIPAA Security Rule require extensive interpretation and documentation on the part of security professionals. However, by arming yourself with knowledge before beginning the process, you can cut down on unnecessary difficulties.

Nightfall vs. BetterCloud: Looking for a BetterCloud alternative?

By one estimate, the average company has a whopping 254 SaaS apps (with enterprises averaging 364 apps). Employees may not be using all 250+ SaaS platforms regularly; this leaves dozens of apps with unchecked access to the business’ IT environment — a big security risk. Tools like Nightfall and BetterCloud aim to reduce this potential risk in different ways.

Nightfall vs. Prisma Cloud: Looking for a Prisma Cloud Alternative?

There are many types of solutions available to organizations that seek to secure their data in the cloud. From cloud DLP to Cloud Access Security Brokers (CASBs) to Cloud Workload Protection Platforms (CWPPs). But, how can you tell which approach to cloud security is right for your business? In this guide, we’ll compare two popular cloud security solutions: Prisma Cloud, a CNSP, to Nightfall, a cloud DLP solution, to help shed some light on the differences between these two approaches.

What is PII? Guide To Personally Identifiable Information

“PII” stands for personally identifiable information. Hackers often target personally identifiable information for a variety of reasons: to steal a customer’s identity, take over an account, launch a phishing attack, or damage an organization. As a result, there is a multitude of regulations concerning PII protection. Before your company approaches meeting these regulations, it’s important to have a firm understanding of the data you will be protecting.

Dissecting Supply Chain Attacks: A Report on a Growing Sensitive Data Exposure Vector

Third-party risk has always been a concern for organizations, but since COVID and the rise of remote work, we’ve seen a dramatic acceleration in campaigns leveraging software supply chain attacks. Not just through open source vulnerabilities, but through closed source applications and services as well. To adapt to this new normal, it’s important to develop an understanding of supply chain attacks and protect yourself from them.

ICYMI: How to Ensure Continuous Data Security & Compliance across your SaaS Apps

We recently hosted a live discussion covering emerging trends within the cloud security space, primarily reflecting on how organizations could adopt a posture of continuous security and compliance across their SaaS applications. Continue on below to view the highlights from this discussion.

The Importance of Continuous Security & Compliance in SaaS Environments

We’re living in the era of “giga-breach,” where cloud data breaches can easily expose in excess of one billion records. As such, the stakes couldn’t be higher for cloud security teams seeking to secure cloud environments. That’s why it’s important to understand the key vectors driving data breaches today. Read on to learn more, or click the thumbnail below to join our upcoming webinar, where we’ll discuss these trends in detail.

How Should Startups Build Their Tech Stack?

At the beginning of every startup’s journey, the question plaguing every technical founder and their team is how to build their tech stack. A lot of thought must go into this question because it informs how the startup will adapt to the demands of business growth and any necessary adjustments or pivots of the business. In a recent webinar, we discussed this question in detail with Jim Walker of Cockroach Labs.

Nightfall and Cribl Partner to Enable Data Loss Prevention in Observability Platforms

We’re excited to announce Nightfall’s partnership with Cribl, the high scale, data processing and observability platform. Cribl’s platform gives companies greater value out of their data by serving as the core plumbing connecting all of your data platforms, allowing users to set up workflows and extract essential data for processing, analysis, or storage.