Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

A Swiss Army Knife for ISO 27001:2022 Compliance

ISO standards may not always jump out as the most exciting of topics for dinner party conversation, but their growing importance in business cannot be denied. And this year it is well worth us talking about ISO 27001:2022 specifically (though perhaps not over dinner). It is expected that as many as 90,000* organisations might renew their certification or gain it for the very first time this year. The auditors will be busy!

AI Assistants: A New Challenge for CISOs

Over the past year, AI innovation has swept through the workplace. Across industries and all team functions, we are seeing employees using AI assistants to streamline various tasks, including taking minutes, writing emails, developing code, crafting marketing strategies and even helping with managing company finances.

Positioning as a Leader in SSE Within Industry Report Signals Future Direction

Bellwether industry analyst reports continue to indicate the future direction for security service edge (SSE) solutions. The recently released report, The Forrester Wave™: Security Service Edge Solutions, Q1 2024, includes Netskope as a Leader and ranked it highest for in the Current Offering category. Beyond the short list of leaders, here is Netskope’s take on the report’s findings and key signals that will help you assess the right vendors to fit your strategic outcomes.

Unlock the Power of Next Gen SASE Branch with IoT/OT Device Intelligence Integrated in Unified SASE Gateway

Imagine a future where office coffee machines autonomously order beans, and both comfort and energy efficiency are effortlessly managed through smart lighting and temperature controls, alongside smart factories leveraging robotic arms for optimal production. With the internet of things (IoT) market expected to reach 55.7 billion devices by 2025, as predicted by IDC, this potential future brings thrilling opportunities and serious challenges.

From Delivery To Execution: An Evasive Azorult Campaign Smuggled Through Google Sites

Netskope Threat Labs has observed an evasive Azorult campaign in the wild that employs multiple defense evasion techniques from delivery through execution to fly under the defender’s radar as it steals sensitive data. Azorult is an information stealer first discovered in 2016 that steals sensitive information including user credentials, browser information, and crypto wallet data.

Introducing Bandwidth Control

In the fast-paced realm of digital connectivity, the effective management of internet bandwidth is pivotal for ensuring business continuity through seamless access to business-critical applications. Network administrators often grapple with the constant challenge of prioritizing business critical applications during network contention, a challenge exacerbated by the prevalence of high-bandwidth-consuming non-business web applications.

Five Principles for the Responsible Use, Adoption and Development of AI

We have been fantasising about artificial intelligence for a long time. This obsession materialises in some cultural masterpieces, with movies or books such as 2001: A Space Odyssey, Metropolis, Blade Runner, The Matrix, I, Robot, Westworld, and more. Most raise deep philosophical questions about human nature, but also explore the potential behaviours and ethics of artificial intelligence, usually through a rather pessimistic lens.

Empowering Secure Cloud Adoption: A Response to the NSA and CISA Cybersecurity Guidelines

In the ever-evolving landscape of cybersecurity, the collaborative effort between the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) in issuing five joint Cybersecurity Information Sheets (CSIs) marks a significant milestone in guiding organizations towards secure cloud adoption. These documents serve as a testament to the critical nature of securing cloud services in an era where digital transformation is not just an option, but a necessity.

Using Insight to Seize the SASE Opportunity

In today’s hybrid working environment, the software as a service (SaaS) apps employees use, and security service edge (SSE) solutions organizations use to secure it are dynamic and distributed. You sometimes need to deal with complex user experience issues without clear visibility into where they originate. Let’s take a look at some increasingly common situations and explore some proven ways IT leaders are regaining control.