Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2023

An Overview of the Netskope AWS CloudTrail Lake Integration

Following the recent AWS CloudTrail Lake announcement, this blog will guide you through how to configure a Netskope Cloud Exchange instance to send Netskope user access logs to AWS CloudTrail Lake using the Cloud Log Shipper (CLS) module and the CLS plugin developed for CloudTrail Lake. Cloud Exchange (deployed in Amazon ECS on Fargate) can be obtained from the AWS Marketplace.

5 Tips To Keep in Mind for Data Privacy Day

No matter what industry you’re in, data privacy is an issue that impacts you. And when it comes to being safe online with sensitive data, whether that’s your personal data or sensitive data that is important to your organization, being informed is the first step. With that in mind, ahead of Data Privacy Day on January 28, we asked a handful of Netskopers from our CSO, internal security, and Netskope Threat Labs teams to provide tips around data privacy that they think everyone should know.

The Best Strategies for Security and Technology Leaders Managing in a Hybrid Work World

It should come as no surprise to anyone who has lived through the last three years that the way we work has changed drastically. The onset of the COVID-19 pandemic forced organizations to figure out how to better enable their employees to work from home securely and easily. The result was an acceleration of trends that were already underway. Work is now hybrid, and adaptability and flexibility continue to be key requirements for organizations working to secure a distributed hybrid workforce.

The Security Implications of A Digital Twin

Digital twins are digital replicas of physical assets, processes, and systems, and they are used to perform simulations and analysis to optimise the real-world performance of those assets, processes, or systems. They have become increasingly popular in many industries, including manufacturing, healthcare, and transportation. However, as digital twins become more prevalent, it is important to consider the cybersecurity implications of these technologies.

ChatGPT: Dispelling FUD, Driving Awareness About Real Threats

ChatGPT is an artificial intelligence chatbot created by OpenAI, reaching 1 million users at the end of 2022. It is able to generate fluent responses given specific inputs. It is a variant of the GPT (Generative Pre-trained Transformer) model and, according to OpenAI, it was trained by mixing Reinforcement Learning from Human Feedback (RLHF) and InstructGPT datasets. Due to its flexibility and ability to mimic human behavior, ChatGPT has raised concerns in several areas, including cybersecurity.

Cloud Threats Memo: Threat Actors Continue to Abuse Cloud Services to Deliver Malware in 2023

Our most recent Cloud and Threat Report highlighted how threat actors abuse cloud services (with a special focus on cloud storage apps) to deliver malicious content (and yes, OneDrive leads the chart of the most exploited apps). To confirm that this trend will likely continue in 2023, researchers at Trend Micro have discovered an active campaign, launched by a threat actor named Earth Bogle.

The Impact of AI on Cybersecurity: Balancing the Risks and Opportunities

As artificial intelligence (AI) advances, I am seeing a lot of discussion on LinkedIn and in the online media about the advantages it may bring for either the threat actors (“batten down the hatches, we are all doomed”) or the security defence teams (“it’s OK, relax, AI has you covered”).

Understanding Evolving Insider Risks in a Hybrid World

Insider risks are threats that already have access to an organization’s sensitive information. They are people who have physical access to the organization’s buildings and credentials to sign-on to the network. But maybe more importantly, they’re familiar with the organization’s processes, they speak the company lingo, and they know where the important assets reside.

Myth Busting: Why Moving From VPN to ZTNA Doesn't Have to be a Heavy Lift

Over the last few years many organizations have already introduced a zero trust network access (ZTNA) solution, and are seeing the benefits from it. But many others have been put off by the work needed to transition to a zero trust-based access model and the associated technical integration work.

Netskope IoT Security

Netskope IoT Security uncovers managed and unmanaged connected devices on both the radio and network spectrum and generates deep device-level contextual intelligence for device classification, asset management, dynamic risk assessment, segmentation, and access control, mitigating IoT-related threats and addressing the hidden attack surface created by the connected devices.

Four Resolutions for Security Leaders to Keep in Mind for 2023

Starting off a new year often comes with a re-energized sense of taking stock of big changes you want to make and how you want to accomplish them. And, as we come off of “prediction season”, there’s also a sense of the hot topics and challenges that are already on the horizon for the security community.

Data Insights for Parenting...and Cybersecurity Teams

I am often struck by the similarities in the skill set required for both parenting and cybersecurity. With children—as with employees—it is much easier to keep everyone safe if you have a little bit of visibility into what’s actually going on. The hardest child to parent effectively is one who shuts themselves away in their bedroom, operating in isolation and giving no clues as to the risks they may be exposing themselves to.