Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

In July 2022, the Pentagon’s acquisition office issued a memo reminding acquisition officials of the DoD’s requirements for handling controlled unclassified information (CUI). The standard which applies to Defense contractors is not new. The original Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 requirement went into effect in 2017.

Fortifying Your Systems: 8 Construction Management Software Security Tips

You can't afford to build on shaky ground in the digital world. Your construction management and accounting software is at risk if it isn't secure. Protecting your business data is also about safeguarding your reputation. So, examine these eight essential security tips to help you fortify your defense, keep your software up-to-date, and ensure you're always ahead of cyber threats.

Nightfall AI: AI-Powered Data Leak Prevention (DLP) for the Enterprise

Data leak prevention (DLP) has become a critical tool for securing the modern enterprise. Think of popular workplace apps like Slack, Salesforce, Google Drive, M365, ChatGPT, and more; these apps have revolutionized workplace productivity, but they’ve also provided new pathways to spread sensitive data and risk compliance. This is where DLP solutions come in. However, legacy DLP relies on rules and heuristics, which overload security teams with false positive alerts and slow the remediation process to a grinding halt.

Nightfall Sensitive Data Protection for Email

Leverage Nightfall’s AI-native platform to pinpoint and protect PII, PCI, PHI, secrets, and credentials across SaaS and email, including Gmail. Built with AI at the core, Nightfall Sensitive Data Protection is transforming email DLP by helping security teams to… … detect sensitive data with 2x better precision and 4x fewer false positive alerts. … act swiftly by blocking or quarantining emails, or removing attachments that contain sensitive data.

Nightfall Data Exfiltration Prevention

Nightfall Data Exfiltration Prevention uses generative AI to discover sensitive data and monitor data movement across SaaS apps like Google Drive. Nightfall’s enterprise-grade data leak prevention platform offers several key benefits, such as… … complete coverage across SaaS apps and managed endpoints. … enhanced detection accuracy, leading to 4x fewer false positive alerts. … streamlined workflows, so security teams can monitor data movement and take action from within a single user-friendly console.

Nightfall SaaS Security Posture Management (SSPM)

Nightfall SaaS Security Posture Management (SSPM) offers real-time visibility into permissions and sharing settings to prevent security posture drift. Nightfall leverages generative AI (GenAI) for a dynamic and responsive management approach to SaaS security posture, which means… … unparalleled visibility into sharing and permissions settings across SaaS apps. … enhanced detection accuracy, leading to 4x fewer false positive alerts.

Building a Robust Data Quality Management Framework: A Step-by-Step Guide

Maintaining data quality is crucial for any business that depends on dependable data. Without a structure in place, organizations run the risk of making decisions based on flawed or incomplete information. To uphold data integrity and make informed decisions businesses need to establish a data quality management framework. In this article, we will delve into the steps involved in constructing such a framework.

Here's what caused the Sisense data breach-and 5 tips for preventing it

From Uber in 2016 to Okta in 2023 to Sisense in 2024, it’s evident that there’s a pattern behind the tech industry’s most devastating breaches: Data sprawl. Let’s dive into how data sprawl played a part in last week’s Sisense breach, as well as how security teams can be proactive in defending against similar attacks.

What is the difference between Information Disclosure and Data Exposure

As digital infrastructure becomes increasingly integrated into every day operations across various industries, ensuring the security of sensitive information becomes crucial for safeguarding both individuals and organizations from cyber threats. In the vast landscape of cybersecurity risks, two terms stand out: information disclosure and data exposure. Understanding these concepts is vital, as they can significantly impact trust and lead to potential repercussions.