Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ask SME Anything: What is Unified Data Security?

Tired of the data security "alphabet soup"? DSPM. DLP. Protecting data in the AI era shouldn't require a glossary. In this episode of Ask SME Anything, Netskope expert Ankur Chadda cuts through the jargon and breaks down the fundamentals of unified data security, revealing four crucial questions every security professional must be able to answer to effectively protect your data from emerging threats.

Cloud Security Tips for Companies

Cloud computing is now central to company operations, but it can also be an opportunity for hackers. As of late last year, 80% of organizations experienced more frequent cloud attacks. Strengthening security is essential. Clear, actionable cloud security tips help protect digital assets with minimal complexity. As companies migrate more services and data to cloud environments, risks grow and become harder to detect.
Featured Post

Mitigating Cloud Security Threats with Strategic Cyber Recovery

Cloud computing has reshaped the business landscape, delivering the scalability, flexibility and efficiency needed to stay competitive in a fast-moving world. However, this digital transformation brings with it security risks. From data breaches to cyberattacks and unexpected outages, today's cloud environments face constant threats. As stated in the IBM data breach report, 80% of organisations have experienced a rise in cloud security incidents, with 45% of breaches being cloud-based, and the average cost of a data breach is $4.35 million.

Zero Trust Engine

The Zero Trust Engine is a foundational component of the Netskope One platform. It plays a pivotal role in gathering comprehensive risk telemetry and delivering unmatched contextual awareness to enable adaptive, least-privileged access to users, devices, applications, and data. This live demo showcases examples of how the Netskope Zero Trust engine provides full visibility and control.

AI: What's the future smell like? | AI Avenue Ep 6

In the season finale, Craig and Yorick take a big whiff of the future. What is our world going to look like? Which future do you want? The sit down with thought leaders from Cloudflare, @IBM, Science Fiction author, and a 9 year-old vibe coder/comedian named Fay. The future is bright if you want it to be.

Improving the trustworthiness of Javascript on the Web

The web is the most powerful application platform in existence. As long as you have the right API, you can safely run anything you want in a browser. Well… anything but cryptography. It is as true today as it was in 2011 that Javascript cryptography is Considered Harmful. The main problem is code distribution. Consider an end-to-end-encrypted messaging web application.

Securing AI Applications in the Cloud: Shadow AI, RAG & Real Risks | Mend.io

What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape. What is an AIBOM and why it matters The stages of AI adoption.

Azure Identity & Access Fundamentals | Sedara Cyber Bytes 2025

Learn how to strengthen your Microsoft cloud security in this recorded session of Sedara’s Cyber Bytes 2025 - Azure Identity & Access Fundamentals. In this workshop, Jason Taylor breaks down how identity and access management works in Microsoft Entra ID and Azure, explains the key differences between Entra and Azure roles, and shares best practices for securing your organization’s cloud identities.