Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Privacy and Other Legislation Amendment Act (POLA Act): Changes and Compliance Considerations

In response to evolving digital risks and growing concerns about data misuse, Australia has introduced a substantial privacy reform via the Privacy and Other Legislation Amendment Act 2024 (POLA Act) passed on December 10, 2024 Designed to modernise the country’s privacy framework and better align it with international standards like the General Data Protection Regulation (GDPR), the POLA Act marks a pivotal shift in how personal information is defined, managed, and protected.

What is Zero Trust Data Format (ZTDF)?

Historically, secure communication across allied nations has been hindered by disparate standards and manual tagging processes. The challenge: each nation and its respective defense agencies have their own data classification and security standards and protocols, making interoperability between allies a constant struggle.

From Legacy to AI-Native: Your Complete Guide to Migrating from Code42 to Nightfall

With Mimecast's acquisition of Code42, enterprise security teams are discovering what many already suspected: their insider risk platform has fundamental limitations that no amount of tuning can fix. Real customers are reporting critical gaps that leave organizations vulnerable, while security teams drown in noise and manual processes. If you're experiencing these frustrations, you're not alone.

Protegrity Developer Edition Setup | Lightweight, Local, and Fast

Most developers know the pain of setting up enterprise security software—hours of dependencies, complicated installs, and endless permissions that slow projects down before they even start. Protegrity Developer Edition is different. It installs the way developers work: lightweight, local, and fast. In this demo, Dan Johnson, a software engineer at Protegrity, walks through the complete setup process.

The Top 10 Mac DLP Solutions of 2025 (and 25+ FAQs Every Security Team Should Know)

Nightfall leads the 2025 Mac DLP market with its API-first, cloud-native architecture that aligns perfectly with Apple's modern security model, offering real-time protection across SaaS, AI tools, and endpoints without the kernel-level complications of legacy solutions. This comprehensive guide evaluates all top 10 solutions and answers the critical questions security teams need to make informed decisions.

The Top 10 Windows DLP Solutions of 2025 (and 30 FAQs Every Security Team Should Know)

Nightfall leads the 2025 Windows DLP market with its unified cloud-native architecture that delivers enterprise-grade endpoint protection without the bloat of legacy solutions, offering real-time AI-powered detection across all exfiltration vectors with >95% precision. This comprehensive guide evaluates the top 10 solutions and answers critical questions security teams need for Windows data protection.

PurePlay DSPM Vendors: What's their second act?

CSPM tools thrived by making cloud posture issues easy to find, but posture alone didn’t stop breaches. The market evolved into CNAPP – uniting posture, runtime, identity, and shift‑left – to deliver protection, not just visibility. DSPM is on the same trajectory: discovery and classification at rest are necessary but insufficient, especially as AI fragments data into shareable snippets that evade label‑centric controls.

Quantum Computing and How it Breaks RSA | Ep. 1 - Quantum Learning Series

On October 7, 2025, the Nobel Prize in Physics was awarded to John Clarke, Michel H. Devoret, and John M. Martinis for their work with superconducting circuits and Josephson junctions—experiments that proved quantum mechanics can govern entire electronic systems, not just individual particles. Their discoveries laid the foundation for today’s quantum computers. Quantum computing is now redefining what’s possible in data security. In Episode 1 of the Quantum Learning Series, we explore what quantum computing really is—and why it poses such a powerful threat to modern encryption.

How ZenBusiness Protects Data Across SaaS While Scaling Safely | Nightfall AI Case Study

ZenBusiness has empowered over 850,000 business owners to launch and grow their businesses. And they’re doing it without letting data protection slow them down. With Nightfall AI’s automation-first DLP, ZenBusiness secures critical enterprise apps, resolves issues efficiently, and keeps their focus on delivering value to business owners. Chris Chipman, Enterprise IT Architect at ZenBusiness, calls Nightfall “that extra IT staff member” that runs 24/7, protecting data wherever it goes.