Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

USB review, Part 2: How to manage USB devices

In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this blog, we’ll look at how you can address these USB security risks. Even in the era of the cloud, USB risks prevail. This is evident from some of the top USB-based searches in Google.
Featured Post

Harnessing the value of data with data monetisation

Businesses around the globe are using new technologies to change the world. But this wouldn't be possible without the use of sensitive data such as Personal Identifiable Information (PII) and Protected Health Information (PHI) to drive advancements in personalisation and sophistication. However, if companies are using data that typically is associated with medical records and insurance claims, this bodes the question, is personal data secure?

Enhancing Shopper Safety: The Role of Mall Security in Today's Retail Environment

Mall security teams play a crucial role in making sure everyone who visits feels secure and protected. With the rise of online shopping, malls are working harder to provide a safe and enjoyable experience for everyone who walks through their doors.  Security professionals use the latest technology and strategies to prevent theft, manage crowds, and handle emergencies quickly and effectively. Their presence deters potential threats and offers shoppers and staff peace of mind. 

5 Steps to Creating an Incident Response Plan

No matter how robust your cyber defenses are, there is a high likelihood that your organization will experience a cybersecurity incident—either directly or as a result of a supply chain attack. Implementing a cybersecurity incident response plan can help you effectively address a cyber event, reduce disruptions to your business operations, and ensure compliance with regulations.

10 Key GDPR Requirements

Is your business unknowingly at risk? The stakes are high when it comes to how businesses handle personal data. A staggering 90% of people have made it clear: they won’t support companies who don’t prioritize data privacy and protection. This is no small concern – tech giants like Facebook and Google have fueled a global debate on privacy, often finding themselves in legal trouble after mishandling user data.

Kubernetes 1.30: A Security Perspective

Kubernetes 1.30 marks a significant milestone in the evolution of the widely used orchestration platform, particularly regarding security enhancements and developer experience. This post will explore updates encompassing secrets management, node and cluster management, data security and additional security measures. Each of these improvements strengthens the Kubernetes framework, making it a more secure and reliable platform for enterprises and developers.

How Much is Your Data Worth?

In a world full of subscriptions, the idea is that if you are not paying for something, you are the product. Companies such as Google, Facebook, and Twitter earn huge revenue by collecting your data and selling it to advertisers, giving them access to your personal information. In return, you may receive targeted advertisements on your feed. However, the disadvantages far outweigh the advantages.

Unlock the Power of Next Gen SASE Branch with IoT/OT Device Intelligence Integrated in Unified SASE Gateway

Imagine a future where office coffee machines autonomously order beans, and both comfort and energy efficiency are effortlessly managed through smart lighting and temperature controls, alongside smart factories leveraging robotic arms for optimal production. With the internet of things (IoT) market expected to reach 55.7 billion devices by 2025, as predicted by IDC, this potential future brings thrilling opportunities and serious challenges.

5 Expert Tips for Protecting Your Enterprise's Sensitive Data

ICYMI, Nightfall recently launched a suite of enterprise DLP offerings including Data Exfiltration Prevention, Data Encryption, Sensitive Data Protection for SaaS and Email, and SaaS Security Posture Management (SSPM). To celebrate our new offerings, as well as our sixth birthday, we took a moment to gather insights from investors including Ryan Nece, Enrique Salem, Maynard Webb, Frederic Kerrest, and Kelvin Beachum Jr.