Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Basics of Cloud Security Glossary

What is it: Agentless architecture refers to platforms and services that are built to run as cloud-native applications. They require no installation, patching, or other forms of long term upkeep on the part of a user. Why it matters: Agentless applications, especially agentless security applications have a lower total cost of ownership (TCO), in terms of man-hours saved in deployment, maintenance, and overhead.

Nightfall Named As A Leader in Data Security by G2 - Summer '23

We're excited to share that Nightfall has been named as a Leader in Data Security in G2's Summer '23 rankings. Huge thank you to our customers and supporters who made this possible, and to our dedicated team who works so hard to keep their cloud data safe. This year has been busy, with the release of our Zendesk Integration, which provides market-leading AI-powered DLP to the most widely used customer support platform.

Capturing Secrets from Environment Variables via CircleCI

CircleCI is a platform that enables continuous integration and delivery of software projects. It allows teams to automate their software development process by building, testing, and deploying their code changes in a consistent and reliable manner. In this blog post, we will explore the Tactics/Techniques/Procedures (TTP) of how environment variables that house sensitive credentials and secrets can be exfiltrated using Circle CI.

The Ultimate Guide to Classifying Exposed Credentials and Secrets

When looking for programmatic secrets, it’s not easy to figure out what is truly sensitive and how high-risk it is. There are many different types of secrets and credentials, and the context makes a difference. For example, there could be public URLs with tokens in them, public UUIDs, or credentials used in frontend code — these could all be considered API keys or secrets, but not necessarily at the same degree of sensitivity/severity as something like AWS credentials.

Six Key Security Risks of Generative AI

Generative Artificial Intelligence (AI) has revolutionized various fields, from creative arts to content generation. However, as this technology becomes more prevalent, it raises important considerations regarding data privacy and confidentiality. In this blog post, we will delve into the implications of Generative AI on data privacy and explore the role of Data Leak Prevention (DLP) solutions in mitigating potential risks.

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?

As organizations increasingly adopt cloud services and applications, securing access to these services becomes crucial to protect sensitive data and maintain compliance. Cloud Access Security Brokers (CASBs) have emerged as a key component in providing comprehensive visibility and control over cloud services.

Defining Your Organization's Attack Surface: The 4 Types of Attack Surfaces

Attack surfaces are a fundamental concept within information security. However, attack surfaces can be constituted of different things. For example, some formulations of an attack surface include not just software and hardware, but the people using them. In this post, we’re going to cover four common types of attack surface, discuss how you should think about the risks associated with each type, and best practices for addressing these risks.

How to Prevent Credit Card Number Exposure in Slack for PCI Compliance

For many companies, a business credit card is part of the organization’s lifeblood. As such access to it must be vigilantly maintained. One potential area of risk is employees sharing credit card details in collaborative SaaS applications like Slack, where these details are at significant risk of being exposed to unauthorized parties.

How to Protect Customer Data in Zendesk - Part 3: Using Nightfall to protect critical stakeholder data

Nightfall’s Cloud DLP platform helps you limit access to sensitive data, by protecting the data where it is stored. With Nightfall you can redact, delete attachments, or make the data private in one click or via automated actions.