Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Solving Privileged Access Management Challenges in Microsoft 365 & SharePoint

The recent US National Guard leak has once again focused attention on the risk that overprivileged access poses. A massive intelligence breach occurred when Massachusetts US National Guardsman Jack Teixeira, an IT specialist with a top secret security clearance, accessed and printed classified files and posted them to a civilian Discord chat room. He did this after having been previously reprimanded for his mishandling of classified information.

Data Exfiltration: Prevention, Risks & Best Practices

Imagine a scenario where a competitor gains access to your organization's most sensitive data, causing severe financial loss and irreparable damage to your reputation. This nightmare can become a reality through data exfiltration. Data exfiltration is a real threat to organizations, as it involves the unauthorized transfer of sensitive information, the effects of which can lead to operational disruption, financial losses and damage to reputation.

Enhance Security and Efficiency for your Unstructured Data with Rubrik and Dell

Unstructured data is a prime target for ransomware attacks, making it crucial for organizations to protect and manage it effectively. Currently, it is estimated that 80-90% of all data generated falls into the unstructured category, consisting of files and objects. Organizations rely on unstructured data to store sensitive information, intellectual property, and other invaluable corporate assets.

The Basics of Cloud Security Glossary

What is it: Agentless architecture refers to platforms and services that are built to run as cloud-native applications. They require no installation, patching, or other forms of long term upkeep on the part of a user. Why it matters: Agentless applications, especially agentless security applications have a lower total cost of ownership (TCO), in terms of man-hours saved in deployment, maintenance, and overhead.

How to remove PII from your Elastic data in 3 easy steps

Personally identifiable information (PII) compliance is an ever-increasing challenge for any organization. Whether you’re in ecommerce, banking, healthcare, or other fields where data is sensitive, PII may inadvertently be captured and stored. Having structured logs enables quick identification, removal, and protection of sensitive data fields easily; but what about unstructured messages? Or perhaps call center transcriptions?

How to Prevent Data Theft by Departing Employees: 7 Best Practices

Departing employees are a source of insider threats that often get overlooked. According to a study by Biscom, more than one in four departing employees steal data when leaving. Whether they do so out of negligence or with malicious intent, such cases can only have negative outcomes for organizations, from loss of competitive advantage to penalties for non-compliance with cybersecurity requirements.

How to Protect Your Sensitive Information: A Guide to Keeping You Safe Online

Have you or someone you know been a victim of a breach of your privacy? Would you know if you did? The majority of people tend not to worry about breaches in their privacy until it’s too late. By this point, your confidential information may already be in the wrong hands. Not to worry, though; this article will equip you with the tools to construct your own personal shield, which will defend you against the possible ways in which your data may be used to directly cause you or your business harm.

Protegrity for Snowflake: Cross-Border Data Movement Made Easy

Organizations must constantly adapt to the challenges of maintaining compliance while handling data. Nowhere is that more apparent than cross-border data protection, which allows data to be and remain protected across jurisdictions, states, counties, and countries with the right data security tools. According to the United Nations, 137 of 197 of its members have data and privacy legislation in place.

The Cybersecurity Risks of AI & How to Safeguard Sensitive Data

Experts in the cybersecurity industry are becoming increasingly concerned about artificial intelligence attacks. A 2020 report from Forrester Consulting found that 88% of decision-makers in the security industry believed offensive AI was on the horizon, and almost two-thirds of them expected AI to lead new attacks.

Nightfall Named As A Leader in Data Security by G2 - Summer '23

We're excited to share that Nightfall has been named as a Leader in Data Security in G2's Summer '23 rankings. Huge thank you to our customers and supporters who made this possible, and to our dedicated team who works so hard to keep their cloud data safe. This year has been busy, with the release of our Zendesk Integration, which provides market-leading AI-powered DLP to the most widely used customer support platform.