Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

3 Powerful Sensitive Data Remediation Features for Nightfall DLP Users

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

How to Set Up Fluent Bit and the Nightfall Filter Plugin

Sensitive data often makes its way into logs. Though most of the time unintentional, these incidents have the potential to do a lot of damage, as they usually involve exposure of API keys, passwords, and customer data that can give attackers access to critical business data or put companies at compliance risk. This is why it’s important for organizations to be proactive about securing their logs.

Nightfall and Hanzo Partner to Deliver World-Class Data Classification as Part of Enterprise e-Discovery

We’re pleased to announce that Nightfall is partnering with Hanzo, a best-in-class enterprise e-discovery and investigations platform. Hanzo’s offerings, now powered by Nightfall DLP, include Nightfall’s machine learning detectors as part of Hanzo’s core functionality.

How Nightfall is building the next generation of DLP

The current wave of digital transformation that has brought more and more businesses online has also introduced an unwelcome side effect: the surface area for attacks has ballooned. As individuals and businesses migrated their sensitive transactions into cloud applications, cloud service providers became responsible for providing high-fidelity data security.

Understanding The Gramm-Leach-Bliley Act (GLBA) Privacy Rule

The Gramm-Leach-Bliley Act, known as the GLBA, was passed in 1999 under President Clinton. The goal of the GLBA was to update and modernize the financial industry. Today, it’s primarily used to protect customer and consumer information, with steep penalties for financial institutions that violate its privacy rules. Here’s what you need to know about the GLBA and its regulations.

Nightfall Introduces 3 Powerful Remediation Features to Enhance Security Teams' Efficiency

Our team has been hard at work with continuous updates to improve and streamline the Nightfall DLP platform. We wanted to share with you the latest platform updates guaranteed to improve the speed at which security administrators and teams will be able to remediate incidents. Here’s what’s new.

How does sensitive information end up in observability platforms?

Observability (logs, traces, metrics) is a core tenet to building strong software systems. Logs are used to debug issues and check on system activity, traces provide valuable insights into system performance and architecture, and metrics allow engineering teams to closely track business metrics within their systems.

NIST vs ISO Compliance: What's the Difference?

As businesses and health organizations seek to strengthen cybersecurity, they’re turning frequently to compliance frameworks to help prioritize, guide, and improve decision-making and implementation. Two of the more popular compliance frameworks are the NIST CSF and the ISO 27001. For IT teams seeking to better understand the difference between these frameworks, as well as which is the ideal tool for their business, here’s what to know.