Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Nightfall Named As A Leader in Data Security by G2 - Summer '23

We're excited to share that Nightfall has been named as a Leader in Data Security in G2's Summer '23 rankings. Huge thank you to our customers and supporters who made this possible, and to our dedicated team who works so hard to keep their cloud data safe. This year has been busy, with the release of our Zendesk Integration, which provides market-leading AI-powered DLP to the most widely used customer support platform.

Top Best Practices for Storing X.509 Private Keys

Public Key Infrastructure (PKI) plays a vital role in managing the public keys utilized by networks. It’s used for public-key encryption, identity management, certificate distribution, and revocation. The foundation of a PKI system lies in asymmetric cryptography involving a pair of public and private keys. Safeguarding the X509 private key is an essential aspect of PKI management.

IoT has an identity problem. Here's how to solve it

Successfully Identifying operating systems in organizations has become a crucial part of network security and asset management products. With this information, IT and security departments can gain greater visibility and control over their network. When a software agent is installed on a host, this task becomes trivial. However, several OS types, mainly for embedded and IoT devices, are unmanaged or aren’t suitable to run an agent.

BestinBAS Threat Researchers Discover Their 40th CVE

SafeBreach Labs is the research and development arm of SafeBreach. SafeBreach Labs delivers cutting-edge vulnerability and cybersecurity research as well as novel product ideas. Real-world insights and observations of “in-the-wild” attacks, as well as in-depth and frequent conversations with the top cybersecurity researchers and CISOs worldwide, serve as the foundation for its research and product-related work.

How Do You Know If You're Covered for TTPs in CISA Critical Advisories?

Depending on what the world’s threat actors are up to and whether their activity is detected, CISA may issue a cybersecurity advisory (CSA) every few days or have nothing for a month. It’s hard to predict, and you never know what’s coming your way. One thing is certain: If you managed cybersecurity for a critical infrastructure entity and this #StopRansomware: BianLian Ransomware Group CSA landed in your inbox, you would probably want to take swift action.

Here's What ChatGPT and Netskope's Inline Phishing Detection Have in Common

Phishing attacks are a major cyber threat that continue to evolve and become more sophisticated, causing billions of dollars in losses each year according to the recent Internet Crime Report. However, traditional offline or inline phishing detection engines are limited in how they can detect evasive phishing pages. Due to the performance requirements of inline solutions, they can only target specific campaigns and, at best, act as a basic static analyzer.

Centralized Log Management for SOX Compliance

Over twenty years ago, a series of corporate financial scandals set off a chain reaction, culminating in criminal convictions and new legislation. After uncovering accounting fraud across public companies like Enron, WorldCom, and Tyco, the US Congress enacted the Sarbanes-Oxley Act of 2002 (SOX).

What Is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) is any data that can identify a specific individual. Data like your Social Security number allows you to open credit cards, get a loan and more. It’s also data that is vital to keep secure in order to protect your identity and assets. Read on to learn more about what types of information qualify as personally identifiable information and how to protect it from cybercriminals.

New Integration Between NC Protect and Janusseal Offers Robust Classification and Dynamic Data Protection for Customers

archTIS is pleased to announce we have partnered with Janusnet, a global leader in data classification, to offer robust classification and dynamic data protection for joint Defence and industry customers looking to implement data-centric zero trust security to protect sensitive information.