Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Understanding ITAR Compliance: A Guide for Australian Companies

The United States and Australian Governments have established strict regulations to safeguard the technology that can be used for military applications. The most sensitive technology is regulated by the U.S. International Traffic in Arms Regulations (ITAR), and it is imperative for any company working with ITAR-controlled technologies and data to comply with these regulations. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.

Backup basics: Ensuring data security in an uncertain world

In today’s digital age, where data is the lifeblood of businesses and individuals alike, the importance of backup and data protection cannot be overstated. Whether you’re a small business owner, a freelancer, or an everyday user of technology, the loss of critical data can have disastrous consequences. Let’s delve into why taking backups is essential and how robust data protection measures can save the day when disaster strikes.

Prevent security drift with Nightfall SaaS Security Posture Management (SSPM)

In order to prevent worst-case data leak and data loss scenarios, security teams need to have both proactive and reactive measures in place. Let’s explore this further with an example. Imagine your sensitive data as valuables within a house. There are multiple ways to secure that house, including the following. To put this example into practice, security teams would need to: The first and last of these bullet points fall under the umbrella of SaaS Security Posture Management, or SSPM.

What is Attribute-Based Access Control or ABAC?

One of the biggest issues facing government and industry is how to securely share sensitive and classified information. While information sharing and collaboration have tremendous benefits for productivity and service outcomes, they do come with risks. A dynamic, data-centric approach is key to securing sensitive information and achieving compliance.

Turning Insight into Action: Data Modernisation in Banking

Financial institutions are struggling to keep pace with technological advancements while ensuring data security and compliance with stringent regulations. Data modernisation has emerged as a critical strategy for banks to remain competitive, enhance customer experiences and fortify data security measures. In this blog post, we’ll discuss the importance of data modernisation in banking.

Navigating Data Privacy for GenAI in Customer Support

As the adoption of generative AI (GenAI) accelerates across enterprises, one of the most promising applications emerges in customer support. GenAI enables automated responses, allowing businesses to engage in natural conversations with customers and provide real-time chat support. However, this convenience comes with inherent risks, particularly concerning data privacy.

Nightfall AI releases GenAI-powered Sensitive Data Protection for the enterprise

The modern enterprise relies on hundreds of SaaS apps, email services, generative AI (GenAI) tools, custom apps, and LLMs, which often contain sensitive data. For too long, security teams have been forced to patch together point solutions for coverage across these channels, increasing their workloads and creating opportunities for sensitive data to slip through the cracks. This is precisely where Nightfall’s single-pane-of-glass solution comes into play: With Nightfall Sensitive Data Protection.

Iron Mountain Data Centers' Proactive Approach to Modern Threats with Rubrik

As a part of Iron Mountain Inc., a global leader in secure data and asset management trusted by 95% of the Fortune 1000, Iron Mountain Data Centers is uniquely positioned to protect, connect, and activate high-value customer data. Historically, Iron Mountain Data Centers took a defensive posture when it came to data security, focused on keeping bad actors out. Given the continually evolving nature of modern threats, the service provider had ambitious plans to elevate their cyber security platform, future-proofing their data security with Rubrik.

Nightfall AI launches data encryption and sensitive data protection for emails

Did you know that 41% of breaches involve email? For threat actors, cloud email systems like Gmail and Microsoft Exchange are treasure troves for valuable internal information like PII, PCI, PHI, secrets, and credentials. In order to limit the blast radius of privilege escalation attacks, and to remain in compliance with standards like HIPAA, it’s essential for enterprises to protect thousands of emails per day.