Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Data Protection: What You Need to Know

It’s no surprise that cloud adoption continues to be a major force impacting organizations today. A 2020 McKinsey survey indicated that many organizations saw several years worth of digital transformation take place in 2020. An IDG survey, which we referenced in our Securing Best of Breed SaaS Applications webinar, suggested that 95% of organizations expect to be partly or fully in the cloud by the end of 2021, with almost half the applications used by their workforce being SaaS or open source.

CISO Insider - S2E5 - A Community of cybersecurity with Michelle Valdez

One Main Financial CISO Michelle Valdez joins CISO Insider to discuss how to build a community of cybersecurity. Her approach is all about resiliency and reducing human risk to minimize the impact of security incidents. We talk about how she built this approach from her long career that began in the Air Force and now includes her work in fintech in the private sector.

Nightfall's data protection & classification platform enables SOC 2 compliance

Security teams that work in highly regulated industries or build solutions for consumers must adhere to compliance controls and regimes required for their business. One of the most important compliance requirements for many companies is the SOC 2 audit. The SOC 2 audit provides detailed information and quality assurance about essential security factors such as the confidentiality of data under your organization’s stewardship, privacy controls, and many other standards.

Is Microsoft Teams HIPAA Compliant?

Microsoft Teams, and subsequently Microsoft, likely need no introduction. The popular collaboration tool launched in 2016, providing organizations with a powerful way to communicate and share information within the Microsoft ecosystem. Tools like Teams have only become more important post-COVID with teams being hybrid, decentralized, and distributed.

ICYM: 4 lessons for securing codebases from secrets exfiltration

Last month we hosted a webinar dedicated to discussing the issue of codebase security. As trends like secrets and credential exfiltration continue to be of concern within systems like GitHub, threats, such as cryptojacking and supply side attacks, have become more of a problem. This makes understanding key aspects of codebase security very important. That’s why we pulled out 4 lessons from our recent session that developers and security engineers must know.

GitHub DLP Webinar - Examples of Codebase Data Breaches (Part 2)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe provides detailed examples of secrets leaks and exfiltration that occurred on GitHub. These incidents illustrate the risk of not just exposing cloud systems but stakeholder information as well.

GitHub DLP Webinar - Modeling the SaaS Threat Landscape (Part 3)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI product specialist Michael Osakwe illustrates the risk SaaS systems like GitHub pose by providing a model of the SaaS threat landscape. In this model, he explains how fundamental aspects of SaaS systems can lead to increased security risks if not taken into account.

GitHub DLP Webinar - Best Practices for Securing Codebases (Part 4)

In this segment from one of our previous webinars on GitHub data loss prevention, Nightfall AI CTO and co-founder Rohan Sathe shares 8 critical best practices that developers and security engineers must keep top of mind in order to protect secrets in codebases and maintain good DevSecOps.

The NIST Cybersecurity Framework: Security Checklist And Best Practices

The National Institute of Standards and Technology (NIST) is part of the US Department of Commerce and was founded in 1901. NIST was originally established to help the U.S. industry become more competitive with economic rivals and peers, such as the UK and Germany. NIST prioritizes developing measurements, metrics, and standards for technology used in different industries.