Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

How to Scan GitHub Repositories for Committed Secrets and other Code Snippets

In 2019, GitHub estimates that over 44 million repositories were created, and over 10 million new developers joined the platform. This comes as no surprise, as GitHub is the world’s largest host of source code. With that designation comes a substantial volume of committed code.

Nightfall helps modernize The Brain and Spine Clinic with DLP for Slack

Dr. Jacob Januszewski opened The Brain and Spine Clinic in January 2020 to serve his community in eastern Florida. Jacob combines his expertise in Minimally Invasive (MIS) Complex Spine Deformity surgery with patient care and compassion to help anyone who visits his clinic get the treatment they need and ensure a smooth recovery.

Featured Post

Data Protection Vs. Cyber Security: Why You Need Both

In recent years, both large and small organizations have been affected by data breaches. Business owners, C-suite executives, and CIOs face the reality that they can be a target of security breaches at any time. These incidents can jeopardize your organization's credibility besides leading to financial and productivity losses.

Leaky O365 Links: Accidental Exposure in O365 Link Sharing

Did you know that the default “copy link” option in O365 personal accounts generates a public shared link with edit permissions? In this edition, we will cover how link sharing in O365 can lead to the accidental internal and public exposure of sensitive data.

Is Your Business Data Safe from the Dark Web?

You may never venture to the dark web, but many bad actors are active on the dark web and they may have access to your corporate data. Sensitive, proprietary business data could already be on there for sale to the highest bidder. That could lead to a security breach, fraud, damaged business reputation, or loss of competitive advantage. You won’t know until it’s too late! Download our ebook, “The Dark Side of the Internet.

New Agent Tesla Variants Capable of Stealing Data from VPNs, Browsers

Some new variants of the Agent Tesla infostealer family are capable of stealing data from multiple VPN clients and web browsers. SentinelOne observed that attackers continue to deploy Agent Tesla across various stages of their operations, as this malware enables criminals with even low levels of technical expertise to manipulate and manage their victims’ infected devices.

How to Protect PII

A wide range of privacy regulations govern how organizations collect, store and use personally identifiable information (PII). In general, companies need to ensure data confidentiality, avoid data breaches and leaks, and make sure data is not destroyed or altered in unauthorized ways. The consequences of lost or leaked PII data are significant. Of course, the individuals involved can be harmed from resulting identity theft and associated costs.

More Than a Tenth of Ransomware Attacks Now Involve Data Theft

Research into recent ransomware submissions revealed that more than a tenth of crypto-malware infections now involve some element of data theft. In the second quarter of 2020, ID Ransomware received 100,001 submissions of crypto-malware pertaining to attacks that had targeted organizations and government entities. Of those attacks, 11,642 involved the theft of victim data by their perpetrators. That’s over 11% of the attacks for that six-month period.

Data Security in Cloud Computing: Key Components

Businesses of all sizes are moving to the cloud to take advantage of the greater data availability, significant cost savings and data redundancy that cloud computing provides compared to a traditional data center-based physical infrastructure. Moving to the cloud can also reduce shadow IT and get data stores out from storage closets and underneath desks so they can be governed and protected in compliance with regulations and best practices.