Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Streamline your security workflows with these 3 shortcuts in Tines

Looking for ways to simplify your cloud DLP workflows in 2024? Read on for 3 ways that Tines—our go-to secure workflow builder—can make your resolutions a reality. First, let’s learn a little about how Tines works. In short, Tines helps users to create “stories” (aka workflows) that streamline communications, automate tasks, and more. Tines stories can take any number of twists and turns by: But how can you put these actions into practice?

The ultimate guide to cloud DLP for GenAI

How many of us use ChatGPT? And how many of us use SaaS applications as part of our daily workflows? Whether you know it or not, if you use either of these tools, your data has likely traveled beyond the boundaries of your “fort.” What do I mean by “fort,” exactly? For this guide, consider your “fort” to be somewhere where you can monitor and secure your data. When data leaks outside your “fort,” it presents a myriad of possible risks.

The Fundamentals of Intrusion

No matter the size of your business, there are assets and data you have on your premises that you need to keep secure from people outside of your organisation. Whether it’s hard copies of personnel data, server rooms, or safety-critical infrastructure, that information, or how to gain access to that information will likely have some value to bad actors willing to use or exploit it.

Nightfall named a 2024 leader in Data Loss Prevention (DLP)

It’s official: Nightfall has been named as a leader in Data Loss Prevention (DLP), data security, and sensitive data discovery by G2’s peer-reviewed marketplace. At Nightfall, our goal is to help customers to discover, classify, and protect their sensitive data across the cloud.

Nightfall's new GenAI detectors are revolutionizing the cloud DLP landscape. Here's how.

Nightfall AI is excited to announce a new generation of detectors powered by generative AI (GenAI). Read on to learn more about recent advancements in our PII, PHI, secrets, and images detectors—as well as how they stack up against competitors like AWS Comprehend, Google DLP, and Microsoft Purview.

Understanding precision, recall, and false discovery in machine learning models

There are various ways to measure any given machine learning (ML) model’s ability to produce correct predictions, depending on the task that the system performs. Named Entity Recognition (NER) is one such task, in which a model identifies spans of sensitive data within a document. Nightfall uses NER models extensively to detect sensitive data across cloud apps like Slack, Microsoft Teams, GitHub, Jira, ChatGPT, and more.

What is data-centric security?

Data is the lifeblood of organizations. It drives decision-making, fosters innovation, and underpins business operations. However, this wealth of data is scattered across multiple cloud platforms, making it an attractive target for cybercriminals, and rendering traditional approaches to data protection obsolete. This is where data-centric security comes into play. This article will explore the concept of data-centric security, why businesses need it, and the benefits it offers.

Security with a High Engineer-to-AppSec Ratio: Insights from Jeevan Singh

Navigating the delicate balance between an expanding number of engineers and the imperative for robust Application Security (AppSec) practices is no small feat. In this interview, we delve into the invaluable perspective of Jeevan Singh, the Director of Security Engineering at Rippling, the #1 workforce management platform. He shares insights and strategies that have allowed him in his career to successfully navigate the intricate maze of security amidst a high engineer-to-AppSec ratio.