Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Top 7 Data Leak Detection Solutions

Today’s threat actors often carry out cyber attacks with the primary objective of accessing and exfiltrating sensitive information from your IT environment. Efforts to obtain this “crown jewel” information usually involve complex multi-phase cyber attacks. But another way in which sensitive data ends up in the hands of malicious actors with a lot less effort is when an organization exposes sensitive data assets in a data leak incident.

Understanding the importance of data retention

It's not uncommon to hear about businesses storing large volumes of personal data. There are endless reasons as to why personal data may be collected and processed, such as to build user profiles in order to send targeted products and services. However, many businesses fail to consider what should be done with the data once it has served its purpose, without negatively influencing their reputation and infringing upon a data subjects' rights.

Two Concerning Security Trends Highlighted by Recent Breaches

Another day, another data breach has become a common refrain, in a world saturated with data breaches and other types of data exposures. But over the past few years, a subtle change in the nature of breaches has taken place. We documented some of this change in our analysis of the 100 largest breaches in the 21st century, highlighting that breaches were getting larger and more likely the result of misconfigurations.

NC Protect is now available in both Microsoft Azure Marketplace and Azure Government Marketplace!

We are excited to share that NC Protect for Microsoft 365 is now available in both Microsoft Azure Marketplace and Azure Government Marketplace! archTIS customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined procurement, deployment and management of NC Protect for M365 from the Marketplaces.

Addressing 3 Critical E-Discovery Challenges Upstream through Data Governance

Today, for enterprises and even SMB companies, IT is a sprawling but interconnected universe of applications, devices, and services all running in tandem to maintain the lifeblood of these organizations—data. Navigating the complexities of this arrangement is not just a challenge for security teams (something which Nightfall customers have attested to, before adopting our platform), it’s a genuine challenge for anyone who must manage and use information.

GitHub Supply Chain Attacks Highlight the Urgency of Zero Trust SaaS Data Security

In early April, the tech industry witnessed a major GitHub security incident targeting GitHub organizations using Heroku and Travis CI. GitHub was made aware of this threat via an attack leveraging AWS API keys to GitHub’s own npm production infrastructure. As upstream security risks within SaaS platforms become more common, organizations that leverage these platforms are relying on tools like Nightfall to protect themselves.

What is DLP (Data Loss Prevention)? - DLP Solutions from Lookout

Data loss prevention (DLP) involves a set of technologies and processes used to discover, monitor and control sensitive data. Why is it so important? Businesses use DLP to prevent data breaches and comply with regulations such as GDPR, HIPAA, PCI DSS, and others. DLP tools allow security staff and network administrators to set business rules that determine what’s sensitive while also providing insight into the use of content within an enterprise.