Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2021

Forward Fix Live: Extending Zero Trust in the Cloud

Trying to make sense of your cloud security posture shouldn't mean flipping between multiple screens and inferring how traffic is behaving. Join this live event to see how you can monitor and verify your security posture across multiple clouds on a single screen.

Netskope Private Access Demo - Browser Access (Clientless)

In this video, we will demonstrate the new client-less Browser Access capabilities in Netskope Private Access (NPA). We will walk you through the configurations and show you how to securely enable access to web applications for contractors, suppliers, and other 3rd party users as well as employee BYOD.

Netskope Selected to Participate in ATARC Zero Trust Lab

We are pleased to share that Netskope has been selected by the Advanced Technology Academic Research Center (ATARC) as one of 49 vendors to participate in its Zero Trust Lab. The Zero Trust Lab is a state-of-the-art physical and virtual test environment that will provide federal agencies with the opportunity to build, test, and evaluate new Zero Trust Architectures in a simulated environment.

Secure DevOps on Google Cloud: Reduce cloud and container risk

Google Cloud is helping businesses build and deploy apps faster than ever before, but at the same time, cloud teams must consider how to implement secure DevOps practices to avoid risk. We’re partnering with Google Cloud to provide security solutions to cloud teams to simplify safeguarding cloud and containers. Today, we announced our collaboration with Google Cloud.

How to meet 24 Google Cloud Platform (GCP) security best practices using open source Cloud Custodian and Falco

You’ve got a problem to solve and turned to Google Cloud Platform to build and host your solution. You create your account and are all set to brew some coffee and sit down at your workstation to architect, code, build, and deploy. Except… you aren’t. There are many knobs you must tweak and practices to put into action if you want your solution to be operative, secure, reliable, performant, and cost effective.

DLP Can Be So Much More Than Compliance

When you think about your DLP approach, what immediately comes to mind? Is it primarily centered around compliance? Is it simply using vendor-provided patterns of interest to satisfy an industry-specific framework like PCI, PII, or GDPR? Chances are, this probably describes at least some part of your DLP strategy because it is not difficult to set up and can satisfy a key business requirement of regulatory compliance reporting.

A Guide to Cloud Data Security Best Practices

Cloud computing has revolutionized the business and technological landscape of the last decade. More organizations are turning to cloud services to better manage massive volumes of both structured and unstructured data on a daily basis. As organizations move more and more information and applications to the cloud, there are growing concerns for data security and regulatory compliance.

Nightfall for Google Drive, now with remediation

Nightfall has added remediation actions for Google Drive violations, so you can fix the issue automatically or with just a click. Nightfall for Google Drive is one of our most popular integrations, helping customers to discover and classify sensitive data across Google Drive. Once sensitive data violations are found to exist in Google Drive, you want to take steps to protect the data – because removing the risk is really the point, isn’t it?

A Real-World Look at AWS Best Practices: Logging

Best practices for securing an AWS environment have been well-documented and generally accepted, such as AWS’s guidance. However, organizations may still find it challenging on how to begin applying this guidance to their specific environments. In this blog series, we’ll analyze anonymized data from Netskope customers that include security settings of 650,000 entities from 1,143 AWS accounts across several hundred organizations.

What To Do When Your Cloud System Crashes

Most organizations today rely on the cloud to store or manage at least some of their data and applications. If your business is considering (or already using) a cloud environment, it’s important that you know what to do if your cloud system crashes or experiences an outage. In this guide, we cover the basics of cloud computing and then outline some steps you can take in the event of a cloud crash or outage.

Yes, We Really Are This Confident in NewEdge Performance. Here's Why.

Over the last year, we’ve made tremendous progress expanding NewEdge to provide Netskope customers with the global coverage they demand. We have real, full-compute data centers in nearly 50 regions today and plans to go live with our Lima, Peru data center in early October (which will be our fifth in Latin America).

Demo - Remote Browser Isolation

Safely isolate risky and uncategorized websites. Remote browser isolation (RBI) uses pixel rendering to deliver seamless and safe viewing of risky websites and ensures no website code executes on end-user devices. RBI isolates uncategorized and risky websites as an option for Netskope secure web gateway (SWG) solutions. Known safe sites are allowed, known bad sites are blocked, and risky websites are isolated for safe viewing all within one cloud platform, one console, and one policy engine.

Access Control Podcast: Episode 9 - SRE-Powered Dev Productivity

In this ninth episode of Access Control, a podcast providing practical security advice for startups, Developer Relations Engineer at Teleport Ben Arent chats with Mario Loria. Mario is a Senior SRE at Carta who has been leading their move to Kubernetes and other cloud native technologies. Carta helps companies and investors manage their cap tables, valuations, investments, and equity plans. As users of Carta, we hope their security is top notch. Today we’ll be chatting about orchestrating Kubernetes, training teams on cloud native, and optimizing for the developer experience!

Demo - Introduction to Netskope SaaS Security Posture Management (SSPM)

Continuously enforce correct cloud configurations for SaaS Applications. SaaS Security Posture Management (SSPM) ensures common SaaS applications like O365, Zoom, Github, or Salesforce are correctly configured, prevents drift, and simplifies compliance management. Built-in guided remediation helps ensure misconfigurations are swiftly fixed before they can be exploited. Netskope SSPM compliments CASB for unmatched SaaS security.

Reckless to Fearless: Automating Remediation in the Cloud

Tines and Lacework are partnering up to bring you insights into the latest in cloud automation. Our tools powerfully combine, helping you take action and automatically solve security alerts in real-time as they occur. This workshop will be centered around an end-to-end demo, walking through the benefits of our tools in combination.

Who Do You Trust? Challenges with OAuth Application Identity

In our recent blog, Who Do You Trust? OAuth Client Application Trends, we took a look at which OAuth applications were being trusted in a large dataset of anonymized Netskope customers, as well as raised some ideas of how to evaluate the risk involved based on the scopes requested and the number of users involved. One of the looming questions that underlies assessing your application risk is: How does one identify applications? How do you know which application is which? Who is the owner/developer?

Straight Talk Series: Network and Security United

A Secure Access Service Edge (or SASE) solution requires both network and security teams, and their tools to work together harmoniously. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Ask SME Anything: What's the difference between SASE and SSE?

In this episode of Ask SME (Subject Matter Expert) Anything, Netskope’s Tony Kros dives into Gartner's new term Security Service Edge (SSE), what distinguishes SASE from SSE, and why both concepts are so fundamental to building cloud-centric security and networking architectures of the future.

Microsoft Office Document Triggering New Zero-Day

Most ransomware groups operating in the RaaS (Ransomware-as-a-Service) model have an internal code of A new zero-day vulnerability (CVE-2021-40444) affecting multiple versions of Windows has recently been discovered and disclosed by Microsoft. According to Microsoft’s Security Update Guide, the MSHTML component can be exploited by an attacker through a custom ActiveX control, allowing remote code execution.

Collaborate Seamlessly with Egnyte and Google Workspace

Today’s organizations utilize a multitude of solutions to create, share and manage their sensitive content. That business reality is exacerbated by additional cloud file storage solutions that result from acquisitions, competing employee preferences, or shadow IT initiatives. So, it’s no surprise IT teams struggle to manage and control document and file system sprawl.

Security Incident Containment with Teleport Session and Identity Locking

What would you do when a security incident is detected? Shut down the servers? Pull out the power cord from the data center? When an incident is detected, both the incident method and the time required to contain an incident are essential to limit the damage. The slower you are to react, the more damage an incident would incur. And a service downtime to contain an incident can cost businesses even more than a security incident itself.

Strengthen your cloud security posture with Azure Sentinel

Scalable, cloud-native solutions like Azure Sentinel help security teams streamline security operations in cloud environments. In this first of a two-part blog series, we explore the challenges businesses face when detecting and responding to cyber threats and attacks, and how these challenges can be addressed by leveraging Microsoft Azure Sentinel.

Ask SME Anything: Does SASE offer any benefit if my organization is still on-premise?

In this episode of Ask SME (Subject Matter Expert) Anything, Netskope’s Vidur Ramnarayan discusses how SASE can benefit any organization whether they are on-premise, fully in the cloud, or somewhere in between. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Understanding Security Service Edge (SSE) and SASE

The SASE journey requires reliable partners with truly integrated platform capabilities, not vendors wielding smoke-and-mirrors-style marketing proclaiming “SASE” in giant headlines. But clarity is critical, and both SASE and the more-recently-coined security service edge (SSE) terminology, can be a little confusing.

Securing Amazon EKS Anywhere with Sysdig

Amazon EKS Anywhere is a new deployment option for Amazon Elastic Kubernetes Service that lets you create and operate Kubernetes clusters on-premises. With it, you can run containerized workloads in whatever location best serves your business. Carefully considering what’s needed for security will help you reduce risk and safeguard against potential threats.

Securing Your Cloud Future

Today, cloud and digital transformations have changed our environments dramatically and the old way of doing security just isn’t cutting it. It’s time for a new approach. Join us to hear from our VP of Security Products, Jane Wong and Head of Intelligence Platform, Patrick Coughlin how you can build an analytics-fueled, automation-driven and cloud-delivered security operation with Splunk Security Cloud.

How to use Cloud SOAR's search query bar to optimize workflow processes

At Sumo Logic, we always pride ourselves on our dedication to make Cloud SOAR as user-friendly as possible. Now, we’re going to show you in practice how we make that happen. Cloud SOAR’s Incident Search Query Bar is easily configurable and allows users to customize their viewing perspective and choose which data they want to see.

A Real-World Look at AWS Best Practices: Networking

Best practices for securing an AWS environment have been well-documented and generally accepted, such as in AWS’s guidance. However, organizations may still find it challenging on how to begin applying this guidance to their specific environments. In this blog series, we’ll analyze anonymized data from Netskope customers that include security settings of 650,000 entities from 1,143 AWS accounts across several hundred organizations.

AI/ML for Malware Detection

Malware detection is an important part of the Netskope Security Cloud platform, complete with a secure access service edge (SASE) architecture, that we provide to our customers. Malware is malicious software that is designed to harm or exploit devices and computer systems. Various types of malware, such as viruses, worms, Trojan horses, ransomware, and spyware, remain a serious problem for corporations and government agencies.

Why Secure Access to Cloud Infrastructure is Painful

Can you enumerate every single network socket which can be used to hack into your cloud environment and steal your data? When counting, are you including the laptops of people who already authenticated and have access? The purpose of opening with this question is not to instill fear. Trying to answer it probably leads to “it’s complicated” and the complexity of access is what this article will cover. Complexity is our collective enemy in the computing industry.

Factors You Should Consider for an Optimal Hybrid Cloud Strategy

Cloud technology is a powerful tool with unmeasurable potential. Across the globe, companies are harnessing the cloud to propel their business solutions. However, there are always some companies that cannot entirely shift their solutions to the cloud. Thanks to the hybrid cloud model, companies house some of their solutions on their on-premises servers and store the rest of them in the cloud. Most companies have adopted the hybrid cloud model, as it suits both conventional and new-age operations.