Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Role Based Access Control vs Attribute Based Access Control: Addressing Common Misconceptions

A dynamic, data-centric approach is key to securing sensitive information and achieving compliance in our modern world of hybrid IT solutions, but what are the differences between RBAC vs ABAC the two common access controls approaches? Over the last two years, companies have seen an expedited shift away from using traditional methods to access their data. With more employees working remotely, we find the security controls we have spent years refining are no longer adequate.

How to Set Up Fluent Bit and the Nightfall Filter Plugin

Sensitive data often makes its way into logs. Though most of the time unintentional, these incidents have the potential to do a lot of damage, as they usually involve exposure of API keys, passwords, and customer data that can give attackers access to critical business data or put companies at compliance risk. This is why it’s important for organizations to be proactive about securing their logs.

Nightfall and Hanzo Partner to Deliver World-Class Data Classification as Part of Enterprise e-Discovery

We’re pleased to announce that Nightfall is partnering with Hanzo, a best-in-class enterprise e-discovery and investigations platform. Hanzo’s offerings, now powered by Nightfall DLP, include Nightfall’s machine learning detectors as part of Hanzo’s core functionality.

How Nightfall is building the next generation of DLP

The current wave of digital transformation that has brought more and more businesses online has also introduced an unwelcome side effect: the surface area for attacks has ballooned. As individuals and businesses migrated their sensitive transactions into cloud applications, cloud service providers became responsible for providing high-fidelity data security.

CISO Insider - S3E3 - The DLP journey with Brent Lassi

Bluecore CISO Brent Lassi joins Chris Martinez on CISO Insider to chat about the many things he’s seen and learned and worked on over two decades in the cybersecurity industry. From founding one of the first application security companies in the world, to following the evolution of DLP over the years, to now working in a cloud-native world without a traditional perimeter and how these challenges led him to Nightfall, Brent has many stories to tell.

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule

The Gramm-Leach-Bliley Act, known as the GLBA, was passed in 1999 under President Clinton. The goal of the GLBA was to update and modernize the financial industry. Today, it’s primarily used to protect customer and consumer information, with steep penalties for financial institutions that violate its privacy rules. Here’s what you need to know about the GLBA and its regulations.

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams' Efficiency

Our team has been hard at work with continuous updates to improve and streamline the Nightfall DLP platform. We wanted to share with you the latest platform updates guaranteed to improve the speed at which security administrators and teams will be able to remediate incidents. Here’s what’s new.

Cloud Penetration Testing Services: How Safe Is Your Business Data?

Businesses are increasingly moving their data and applications to the cloud. While this offers many benefits, it also creates new security risks.#cloudsecurity #cloudpenetration Cloud penetration testing is a process of identifying and exploiting vulnerabilities in a cloud-based system. By identifying these weaknesses, businesses can protect themselves against malicious attacks and ensure that their data is safe