Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

What is Data Leakage? Data Leak Prevention Tips

Data leaks can happen in many ways, and they’re surprisingly common. For example, a company might be hacked by cybercriminals; someone may lose their laptop with sensitive information; employee records could get lost during the relocation process. It doesn’t take much for sensitive information to get into the wrong hands. In fact, research has found that more than half of all data leakages come from human errors like typos and lost files.

ICYM: 4 lessons for securing codebases from secrets exfiltration

Last month we hosted a webinar dedicated to discussing the issue of codebase security. As trends like secrets and credential exfiltration continue to be of concern within systems like GitHub, threats, such as cryptojacking and supply side attacks, have become more of a problem. This makes understanding key aspects of codebase security very important. That’s why we pulled out 4 lessons from our recent session that developers and security engineers must know.

GitHub DLP Webinar - Examples of Codebase Data Breaches (Part 2)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe provides detailed examples of secrets leaks and exfiltration that occurred on GitHub. These incidents illustrate the risk of not just exposing cloud systems but stakeholder information as well.

GitHub DLP Webinar - Modeling the SaaS Threat Landscape (Part 3)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe illustrates the risk SaaS systems like GitHub pose by providing a model of the SaaS threat landscape. In this model, he explains how fundamental aspects of SaaS systems can lead to increased security risks if not taken into account.

The NIST Cybersecurity Framework: Security Checklist And Best Practices

The National Institute of Standards and Technology (NIST) is part of the US Department of Commerce and was founded in 1901. NIST was originally established to help the U.S. industry become more competitive with economic rivals and peers, such as the UK and Germany. NIST prioritizes developing measurements, metrics, and standards for technology used in different industries.

Prevent secrets, credentials, and PII leaking in application logs with the Nightfall Developer Platform

Infosec leaders have a lot of corners to cover in their cybersecurity strategy. When crafting the tactics and onboarding the platforms that will protect sensitive information, the checklist of requirements could be missing a very important vector for attack, compliance risk or data loss: application logs.

Preventing data loss in data warehouses with the Nightfall Developer Platform

Data warehouses power your data analysis and business intelligence operations so you can level up your knowledge and progress toward bigger business goals. Like any key component of your tech stack, using data warehouses effectively also requires care and caution — especially when uploading and sharing sensitive information.

Deploying Rubrik Cloud Cluster from the AWS Marketplace

Deploying a Rubrik Cloud Cluster on AWS has never been easier! Watch this video to learn how you can utilize the AWS Marketplace to easily deploy a fully configured 4 node Rubrik cluster in the cloud. Running Rubrik data management software in the cloud enables many features such as backup of Cloud Native NAS filesystems, VMC on AWS protection, point-in-time recovery of SQL, Oracle or SAP Hana and much more...

GLBA Compliance Checklist: Keeping Financial Data Safe And Secure

GLBA compliance isn’t something to take lightly. These measures are strictly enforced by the Federal Trade Commission (FTC). In 2018, for instance, Venmo and its parent company PayPal reached a settlement after complaints about the company’s handling of privacy disclosures. The peer-to-peer payment app had 150 days to adhere to GLBA compliance, or it faced fines of up $41,484 per violation.

Five key points to consider for implementing a successful EDRM Project

As the corporate boundaries expand, the traditional perimeter-based security measures may not be sufficient to protect a company’s sensitive data. To address the growing threat landscapes, there is a need to protect data throughout its lifecycle be it at rest, in transit, or in use.