Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Falcon Data Protection Preventing GenAI Data Loss: Demo Drill Down

Though GenAI is a great productivity tool, many organizations risk losing sensitive data. CrowdStrike Falcon® Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach in making GenAI safer for organizations. In this demo, see how easy it is to stop sensitive data from leaking into web-based GenAI tools like ChatGPT.

Why We Should Probably Stop Visually Verifying Checksums

Hello there! Thanks for stopping by. Let me get straight into it and start things off with what a checksum is to be inclusive of all audiences here, from Wikipedia : “A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.”
Featured Post

Harnessing the value of data with data monetisation

Businesses around the globe are using new technologies to change the world. But this wouldn't be possible without the use of sensitive data such as Personal Identifiable Information (PII) and Protected Health Information (PHI) to drive advancements in personalisation and sophistication. However, if companies are using data that typically is associated with medical records and insurance claims, this bodes the question, is personal data secure?

How Much is Your Data Worth?

In a world full of subscriptions, the idea is that if you are not paying for something, you are the product. Companies such as Google, Facebook, and Twitter earn huge revenue by collecting your data and selling it to advertisers, giving them access to your personal information. In return, you may receive targeted advertisements on your feed. However, the disadvantages far outweigh the advantages.

5 Expert Tips for Protecting Your Enterprise's Sensitive Data

ICYMI, Nightfall recently launched a suite of enterprise DLP offerings including Data Exfiltration Prevention, Data Encryption, Sensitive Data Protection for SaaS and Email, and SaaS Security Posture Management (SSPM). To celebrate our new offerings, as well as our sixth birthday, we took a moment to gather insights from investors including Ryan Nece, Enrique Salem, Maynard Webb, Frederic Kerrest, and Kelvin Beachum Jr.

Nightfall was built on AI. Here's how we're advancing our mission to scale data protection in the enterprise.

Back in 2018, Rohan and I founded Nightfall on the belief that AI could make data leak prevention (DLP) better, faster, and more accessible to every enterprise. At the time, Rohan was a founding engineer at Uber Eats, and I was an investor at Venrock specializing in SaaS and security. From these respective vantage points, we could see that legacy solutions weren’t working, and could never keep up with the evolving threat landscape.

Understanding ITAR Compliance: A Guide for Australian Companies

The United States and Australian Governments have established strict regulations to safeguard the technology that can be used for military applications. The most sensitive technology is regulated by the U.S. International Traffic in Arms Regulations (ITAR), and it is imperative for any company working with ITAR-controlled technologies and data to comply with these regulations. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.

Backup basics: Ensuring data security in an uncertain world

In today’s digital age, where data is the lifeblood of businesses and individuals alike, the importance of backup and data protection cannot be overstated. Whether you’re a small business owner, a freelancer, or an everyday user of technology, the loss of critical data can have disastrous consequences. Let’s delve into why taking backups is essential and how robust data protection measures can save the day when disaster strikes.

Prevent security drift with Nightfall SaaS Security Posture Management (SSPM)

In order to prevent worst-case data leak and data loss scenarios, security teams need to have both proactive and reactive measures in place. Let’s explore this further with an example. Imagine your sensitive data as valuables within a house. There are multiple ways to secure that house, including the following. To put this example into practice, security teams would need to: The first and last of these bullet points fall under the umbrella of SaaS Security Posture Management, or SSPM.

What is Attribute-Based Access Control or ABAC?

One of the biggest issues facing government and industry is how to securely share sensitive and classified information. While information sharing and collaboration have tremendous benefits for productivity and service outcomes, they do come with risks. A dynamic, data-centric approach is key to securing sensitive information and achieving compliance.