Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The State of Secrets Detection in SaaS Apps

Welcome to our first ever The State of Secrets Security in SaaS Apps, an in-depth look at what security risks are posed by the data stored in organizations' SaaS applications. As companies have adopted a remote-first approach to work, these solutions have increasingly been used to send and store passwords, secrets, and API keys.

Secrets Need to be Secured Everywhere Not Just in Code Repositories

Organizations are unaware of the prevalence of API keys and secrets throughout their systems, and how their users are sharing and using them. Even with security best practices and policies in place, the lack of awareness or compliance, as well as the possibility of human error means that API keys and secrets need protection regardless of where they are stored or shared.

Third Party Risk from Supply Chain Attacks Will be Gift that Keeps Giving in 2023

Last month, over the holidays, we witnessed multiple vendors experience security breaches of varying levels of severity. From LastPass and Okta to Slack and CircleCI, the news has been filled with headlines reporting on the aftermath of these incidents. We wanted to briefly cover these stories and discuss their implications for you in the current year.

Nightfall Enables Advanced Secret Detection with Enhanced Machine Learning API Key Detector

Compromised secrets and credentials are the most common cause of data breaches and are often left unmanaged. In the past year alone, we’ve seen sustained growth in supply chain attacks and security incidents impacting the security of secrets stored in code repos or unknowingly shared within SaaS applications. Because of this, there is a compelling need for reliable, accurate, and actionable secrets detection for modern organizations.

Nightfall's New PHI Detector Improves Security Automation for Healthcare Orgs

With Nightfall’s enhanced PHI detection capabilities, which are based on an advanced combination of logic and context, it is very easy to identify specific instances of PHI unique to organizations. What’s even better is that all of this can be automated and tie seamlessly into existing customer workflows.

Understanding the basics of Cloud Security: What is Zero Trust & Why does it Matter?

Cybersecurity professionals are tasked with the difficult job of protecting their organization's data from malicious actors. To achieve this goal, zero trust security has become an essential tool for organizations. But what exactly is zero trust? In this post, we’re going to separate signal and noise by disambiguating the term zero trust. We’ll talk about what it is, why it matters, and key takeaways you should have regarding the state of cybersecurity in 2023.

Nightfall 2022 in Review: A Look at the Exciting Developments in the Past Year

The demand for cloud security continues to increase in the face of supply chain attacks affecting the security of hundreds of thousands of organizations on platforms like GitHub. These concerning developments are among the reasons why we’re building Nightfall and are top of mind as we pursue our vision of enabling data security everywhere in the cloud. 2022 has been a busy and exciting year for us here at Nightfall as we’ve built out the platform in response to these developments.

ISO 27001:2022 and the new requirements for Data Leakage Prevention

The ISO 27001 is one of the most recognized security standards for private sector organizations across the globe and is often required by prospective enterprise customers, helping organizations unlock new business opportunities. ISO 27001 was recently updated along with its companion guidance standard ISO 27002. The updated title for this standard is ISO/IEC 27001:2022 Information Security, Cybersecurity, and Privacy Protection.

How can Cyber Security Playbooks and Runbooks Benefit Your Security Program?

You probably don’t need anyone to tell you that, today, infosec and cybersecurity are challenging and fast-paced endeavors. In the last five years alone, we’ve seen a myriad of industry altering developments — from an ever expanding universe of privacy compliance legislation and the permanent entrenchment of hybrid and remote work, to growth in the size and scope of data breaches — the world of security has proven ever complex and ever-shifting.