Blog

search icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Top stories

More stories

How To Manage The Hidden Impacts of Data Leak With Cloud DLP
Blog

How To Manage The Hidden Impacts of Data Leak With Cloud DLP

How To Manage The Hidden Impacts of Data Leak With Cloud DLP

Data leaks are a type of data loss threat that often fly under the radar — making them potentially more damaging than a malware or ransomware attack. Compared to data breaches, data leaks put customer information at risk accidentally. Data leaks can lead to credit card fraud, extortion, stolen IP, and further attacks by cybercriminals who seek to take advantage of security misconfigurations.

ICYMI: 5 Major Considerations for Slack Security in 2022
Blog

ICYMI: 5 Major Considerations for Slack Security in 2022

ICYMI: 5 Major Considerations for Slack Security in 2022

We hosted a webinar alongside Bluecore CISO Brent Lassi to discuss data security risks facing high-growth organizations like his on SaaS systems like Slack. Watch the following clips to learn 5 important lessons about Slack and SaaS security that are worth keeping in mind this year.

The Essential Guide to Slack Data Loss Prevention (DLP)
Guides

The Essential Guide to Slack Data Loss Prevention (DLP)

The Essential Guide to Slack Data Loss Prevention (DLP)

How to implement data loss prevention (DLP) on Slack, and detect leakage of sensitive data across any Slack workspace.

Data Loss Prevention (DLP) for Salesforce
Announcement

Data Loss Prevention (DLP) for Salesforce

Data Loss Prevention (DLP) for Salesforce

Salesforce houses high volumes of customer information, support tickets, quotes and files, synced emails, tasks & notes, and much more. This data can often be accessed by teams across the company who may leverage Salesforce to provide prospects and customers with a great customer experience.

How to implement cloud DLP with new Nightfall tools and product updates
Newsletter

How to implement cloud DLP with new Nightfall tools and product updates

How to implement cloud DLP with new Nightfall tools and product updates

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job.

Database Security: How Cloud DLP Can Help Protect Sensitive Data
Blog

Database Security: How Cloud DLP Can Help Protect Sensitive Data

Database Security: How Cloud DLP Can Help Protect Sensitive Data

Databases are great targets for hackers and cybercriminals. There’s a wealth of information that can be gained by infiltrating a database, from proprietary intellectual property to customer data to financial records. One of the reasons why database security is so difficult is known as “Anderson’s rule” — that the more useable and more accessible the database, the more vulnerable it is to security threats.

Building Endpoint DLP to Detect PII on Your Machine in Real-Time

Building Endpoint DLP to Detect PII on Your Machine in Real-Time

Building Endpoint DLP to Detect PII on Your Machine in Real-Time

In this tutorial, we will build a lightweight endpoint DLP scanner that scans files on your device in real-time for sensitive data like PII & secrets using Nightfall's data loss prevention APIs.

Creating a custom Temporal data convertor for encryption
Engineering

Creating a custom Temporal data convertor for encryption

Creating a custom Temporal data convertor for encryption

Nightfall is a data security vendor that integrates with our customers’ third party applications (Slack, Google Drive, Github, Jira etc) to, on a continuous real-time basis, scan all content being added to these applications for sensitive data.

Data Masking Techniques and Best Practices for Data Security
Blog

Data Masking Techniques and Best Practices for Data Security

Data Masking Techniques and Best Practices for Data Security

The risks of a data leak have never been higher. Over the last year, data breach costs rose from $3.86 million to $4.24 million, a record high. Data exfiltration, sophisticated hacker attacks, and even insider threats are forcing organizations across the board to take a more sophisticated, multi-layered approach to data security.

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

Deploy a File Scanner with Nightfall Data Loss Prevention (DLP) API

In this tutorial, we will create and deploy a server that scans files for sensitive data (like credit card numbers) with Nightfall's data loss prevention (DLP) APIs and the Flask framework.

How To Protect Sensitive Data with Cloud DLP
Blog

How To Protect Sensitive Data with Cloud DLP

How To Protect Sensitive Data with Cloud DLP

A recent report from IBM found that data breach costs rose from $3.86 million to $4.24 million in 2021. This year’s estimate is the highest average total cost in the 17-year history of the IBM Cost of a Data Breach Report.

6 Cloud Data Loss Prevention Best Practices & Strategies
Blog

6 Cloud Data Loss Prevention Best Practices & Strategies

6 Cloud Data Loss Prevention Best Practices & Strategies

Data loss prevention (DLP) refers to a category of tools and technologies that classify, detect, and protect information (data) in three states: data in use, data at rest, and data in motion. The purpose of DLP is to enforce corporate data security policies that govern where data does — and doesn’t — belong.

Redacting Sensitive Data in 4 Lines of Code with Nightfall Data Loss Prevention (DLP) API
Guides

Redacting Sensitive Data in 4 Lines of Code with Nightfall Data Loss Prevention (DLP) API

Redacting Sensitive Data in 4 Lines of Code with Nightfall Data Loss Prevention (DLP) API

In this tutorial, we'll demonstrate how easy it is to redact sensitive data and give you a more in-depth look at various redaction techniques, how Nightfall's data loss prevention (DLP) API works, and touch upon use cases for redaction techniques.

PCI Data Discovery Tools: Keeping Sensitive Data Protected Within Your Organization
Blog

PCI Data Discovery Tools: Keeping Sensitive Data Protected Within Your Organization

PCI Data Discovery Tools: Keeping Sensitive Data Protected Within Your Organization

The rules set forth by PCI-DSS can seem complicated. Four levels, 12 requirements, multiple credit card brands: it’s easy to get lost in the details of PCI-DSS requirements.

Developer-centric news & updates from Nightfall
Newsletter

Developer-centric news & updates from Nightfall

Developer-centric news & updates from Nightfall

The Nightfall blog is a knowledgebase for cybersecurity professionals with news and insights from the world of cloud security. Each week, we’re publishing new content to help you stay up-to-date on cybersecurity topics and to prepare you for the issues and threats that occur every day on the job

Popular Resources

No items found.
Nightfall Mini Logo

Schedule a live demo

Speak to a DLP expert. Learn the platform in under an hour, and protect your data in less than a day.