Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Top tips: What happens to your data after you delete an app?

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, we’re uncovering the truth about app deletion, why removing an app from your phone doesn’t always mean your data is gone, and how to make sure your personal information doesn’t keep following you long after you’ve tapped uninstall. I recently found myself staring at my phone’s home screen. It felt cluttered.

10 Information Security Policies Every Organization Should Implement

Creating and implementing information security policies (ISPs) may seem like a formality to some. However, ISPs form the backbone of your data security posture. Information security policies and procedures can help you prevent data breaches, legal penalties, and financial losses by defining what’s allowed within your organization and what’s not. Developing an efficient security policy can seem like a lengthy and daunting task.

The Workday Breach: Why Your DLP Strategy Is Already Obsolete

The Workday breach isn't just another security incident—it's a blueprint for how modern attackers are systematically dismantling traditional Data Loss Prevention (DLP) strategies. When a company renowned for security excellence falls victim to social engineering that bypasses every conventional control, it's time to fundamentally rethink your approach.

Now Your Data is on the Dark Web - What's Next?

No one sleeps with two eyes shut knowing that the nefarious part of the internet has their data. Whether you're a civilian navigating your lowkey life or a 6+ figure key figure, the tension always manifests itself. If this is you, telling you not to worry could send us through the cloud; just a packed punch. But now that your sensitive data is out there on the dark web, what's the course of action?

Australia's 2025 Protective Security Policy Framework (PSPF) Now Mandates Zero Trust - What You Need to Know and Do

Australia’s updated Protective Security Policy Framework (PSPF) now mandates the adoption of Zero Trust principles. Australia’s Protective Security Policy Framework (PSPF) Annual Release 2025 now formally mandates the adoption of zero trust principles to improve cybersecurity posture. Government organisations must now align their cybersecurity strategies with the Information Security Manual and the Guiding Principles to Embed a Zero Trust Culture.

How to Keep Your Data Secure as a Digital Nomad

As a digital nomad, your data is constantly at risk from cyber threats like weak passwords, phishing attacks and unsecured WiFi networks. In this video, we break down the biggest cybersecurity risks for digital nomads and share essential tips to keep your data safe — wherever you work.

Nightfall Product Updates & News: July/August 2025

This summer has been big for Nightfall. From launching Nyx, our AI copilot for DLP, to expanding our detection capabilities across more platforms, we’re making it easier than ever for security teams to protect sensitive data without slowing down work. In this update, you’ll find new AI-driven features and platform enhancements designed to make your DLP workflows smarter, faster, and more precise.

Cybersecurity in Fintech. Why Is It Important?

Financial technology has transformed the way people and businesses manage money. Mobile banking, online investment platforms, and payment apps are now part of daily life. Yet with this convenience comes an increased risk of cyberattacks. Sensitive financial data is a prime target for hackers, making cybersecurity in fintech not just a priority but a necessity. Even fintech API providers play a critical role in ensuring data is securely exchanged between platforms and applications. Without strong protection measures, the trust that fuels fintech growth could erode quickly.