Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PCI DSS 4.0 Requirements - Protect from Malicious Software and Maintain Secure Systems and Software

We often hear how a company was compromised by a sophisticated attack. This characterization contains all the romantic thrill of a spy movie, but it is usually not how most companies are victimized. Most breaches usually happen as a result of malware entering the environment. The need to protect against malware is addressed in progressive degrees in Requirement 5 of the new 4.0 version of the Payment Card Industry Data Security Standard (PCI DSS).

Over 480k Patients Lose Medical Information to Hackers in Recent Intellihartx Breach

Nearly 500,000 people lost medical and personal data in a recent ransomware attack on Intellihartx. The company is known for handling collections and patient balances for medical companies. The organization suffered a breach that lost a substantial amount of protected information for different people, and that's a serious problem that should be addressed as soon as possible.

Technical Blog: What you can't do with Kubernetes network policies (unless you use Calico): TLS Encryption

Kubernetes documentation clearly defines what use cases you can achieve using Kubernetes network policies and what you can’t. You are probably familiar with the scope of network policies and how to use them to secure your workload from undesirable connections. Although it is possible to cover the basics with Kubernetes native network policies, there is a list of use cases that you cannot implement by just using these policies.

Lie Machines - The global fight against misinformation

In this latest podcast in our ‘Beyond Data’ series, Tessa Jones (Calligo’s Chief Data Scientist) and Peter Matson (Data Science Practice Lead) talk with Oxford University’s Professor Philip Howard about the threats posed to democracy by technology, specifically in the shape of Lie Machines.

Cybersecurity Risk Assessment Tools You Can Use Year-Round

When it comes to improving cybersecurity at your organization, there are some fixes that you can undertake with very little preparation. More robust risk remediation efforts, however, usually start with a cybersecurity risk assessment. These assessments are commonly offered by third-party consultants, sometimes as a stand-alone service and sometimes as the first step in a larger end-to-end cybersecurity engagement.

Top 10 CNAPP Software Vendors for 2023

As a developer or member of a DevOps team, you probably know the stress and satisfaction of pouring your heart and soul into developing a groundbreaking cloud-native application. But without proper protection, your hard work could be compromised in seconds. That’s where CNAPP comes in, revolutionizing how we can ensure the security of our applications.

Minimizing Intrusion Detection Time with Cyber Threat Intelligence

With the increasing frequency of cyber-attacks, businesses need to prioritize proactive early incident detection. In this blog, we will highlight the significance of a high-quality threat intelligence solution in building a well-rounded and proactive defense strategy. In an era defined by pervasive connectivity, businesses of all sizes find themselves grappling with an escalating threat of cyber-attacks.

Nightfall Named As A Leader in Data Security by G2 - Summer '23

We're excited to share that Nightfall has been named as a Leader in Data Security in G2's Summer '23 rankings. Huge thank you to our customers and supporters who made this possible, and to our dedicated team who works so hard to keep their cloud data safe. This year has been busy, with the release of our Zendesk Integration, which provides market-leading AI-powered DLP to the most widely used customer support platform.

Top Best Practices for Storing X.509 Private Keys

Public Key Infrastructure (PKI) plays a vital role in managing the public keys utilized by networks. It’s used for public-key encryption, identity management, certificate distribution, and revocation. The foundation of a PKI system lies in asymmetric cryptography involving a pair of public and private keys. Safeguarding the X509 private key is an essential aspect of PKI management.