Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

When Collaboration Tools Become Exfiltration Channels: What the Palantir Case Reveals

Last week, Palantir filed a lawsuit in Manhattan federal court alleging that two former senior engineers used Slack to transfer confidential documents - including healthcare demonstration frameworks, revenue cycle diagrams, and customer deployment plans - the day after one of them gave notice. The documents were allegedly accessed later on a personal phone. The engineers had since joined Percepta, a competing AI startup backed by General Catalyst that emerged from stealth mode in October.

Embracing Zero Trust: Lessons from Australia's Defence Supply Chain Data Breach

Earlier this week, The Australian broke the news that the Cyber Touhan hacking group stole classified plans for Australia’s new infantry fighting vehicles, a $7B AUD procurement program, in a massive cyber-attack targeting 17 Israeli defence contractors in the supply chain. The attack was carried out by targeting a downstream supplier, MAYA Technologies, exploiting vulnerabilities in their network and peripherals to gain access to sensitive data.

AI Browsers Are Silently Exfiltrating Sensitive Data - and Legacy DLP Can't See It

A new class of AI-powered browsers are rewriting the rules of data security. While CISOs focus on traditional vectors, employees are unknowingly creating permanent backdoors to your most sensitive data through browsers that remember everything, sync everywhere, and share it all with AI models. The bottom line: If you're not actively protecting against AI browser exfiltration, you're already leaking data. Here's why it's happening, what it costs, and how to stop it today.

From Cyberhaven to Nightfall: A Practical Migration Blueprint for Modern DLP

As organizations evaluate modern DLP solutions, the gap between vendor promises and operational reality becomes critical. Through analysis of organizations running Cyberhaven - including several evaluating migration to Nightfall - we've discovered systematic challenges that impact security effectiveness, operational efficiency, and business productivity. This analysis provides CISOs and security leaders with crucial insights for making informed DLP decisions.

Data classification and DLP: Prevent data loss, prove compliance

A successful data security strategy isn’t about one tool, it’s about a sequence of steps. The first is understanding your data. The second is controlling how it moves. Together, classification and DLP create a data security foundation that prevents data leaks and breaches without slowing down the business. Unlike point tools, modern data classification solutions continuously scan repositories in real time, ensuring new files and updates are labeled correctly as your environment changes.

The Top 10 Endpoint DLP Solutions of 2025 (and 30 FAQs Every Security Team Should Know)

Nightfall delivers the most comprehensive endpoint DLP in 2025 by combining lightweight agents with cloud-native architecture, protecting Windows, Mac, endpoints while uniquely preventing data leaks to AI tools with 95% accuracy.

Privacy and Other Legislation Amendment Act (POLA Act): Changes and Compliance Considerations

In response to evolving digital risks and growing concerns about data misuse, Australia has introduced a substantial privacy reform via the Privacy and Other Legislation Amendment Act 2024 (POLA Act) passed on December 10, 2024 Designed to modernise the country’s privacy framework and better align it with international standards like the General Data Protection Regulation (GDPR), the POLA Act marks a pivotal shift in how personal information is defined, managed, and protected.

What is Zero Trust Data Format (ZTDF)?

Historically, secure communication across allied nations has been hindered by disparate standards and manual tagging processes. The challenge: each nation and its respective defense agencies have their own data classification and security standards and protocols, making interoperability between allies a constant struggle.

From Legacy to AI-Native: Your Complete Guide to Migrating from Code42 to Nightfall

With Mimecast's acquisition of Code42, enterprise security teams are discovering what many already suspected: their insider risk platform has fundamental limitations that no amount of tuning can fix. Real customers are reporting critical gaps that leave organizations vulnerable, while security teams drown in noise and manual processes. If you're experiencing these frustrations, you're not alone.