Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Netskope Cloud Threats Memo: Learnings From the Hi-Tech Crime Trends 2022/2023

The underground economy of the initial access brokers (IABs) is more flourishing than ever. At least this is one of the conclusions of the recent report “Hi-Tech Crime Trends 2022/2023” released by Group-IB. Initial access brokers exploit vulnerabilities or misconfigurations to get hold of valid access credentials (typically VPN or RDP) and outsource or sell them to criminal gangs, including ransomware operators.

Big Trends From the 2023 Okta Business at Work Report

This year’s Okta Business at Work annual report highlights growth, despite national headlines with concerns about a recession and economic contraction. Given Okta’s role as a leading identity service provider, the growth theme is good news for stronger authentication and protection against access compromise, phishing, and ransomware.

5G and SASE: A Match Made in Heaven

I recently attended the LEAP tech event in Saudi Arabia, and it was clear walking the trade show floor that 5G is hitting critical mass. Lightning-fast network connections are now rolling into cities across Saudi Arabia and the wider world, and while it’s true that some countries are further into the rollout of 5G than others, all the network providers and consultancies last week were showcasing wide-ranging use cases of 5G.

The 3 Major Shortcomings of Traditional DLP

As digital transformation continues to blossom and cloud adoption increases, we continue to see challenges crop up when it comes to traditional DLP solutions. Setting aside the architectural and operational complexity and high cost that comes with traditional DLP, practitioners recognize that existing tools aren’t able to keep up.

The UK's NCSC Cyber Essentials Zero Trust Update: Explained

Late in January this year, the UK’s National Cyber Security Centre announced an update to its Cyber Essentials scheme in order to ensure it “continues to help UK organisations guard against the most common cyber threats”. This year’s update isn’t an overhaul on the same scale as last year’s, but it did include important new guidance about zero trust architectures.

Cloud Threats Memo: Understanding the Growing Risk of Consent Phishing

The advent of cloud applications led to a new generation of phishing attacks (named OAuth phishing or consent phishing) where, rather than stealing the user credentials, threat actors aim to obtain an authorization token via a rogue cloud app that allows them to perform harmful activities on the victim’s cloud environment.

An Overview of the Netskope AWS CloudTrail Lake Integration

Following the recent AWS CloudTrail Lake announcement, this blog will guide you through how to configure a Netskope Cloud Exchange instance to send Netskope user access logs to AWS CloudTrail Lake using the Cloud Log Shipper (CLS) module and the CLS plugin developed for CloudTrail Lake. Cloud Exchange (deployed in Amazon ECS on Fargate) can be obtained from the AWS Marketplace.

5 Tips To Keep in Mind for Data Privacy Day

No matter what industry you’re in, data privacy is an issue that impacts you. And when it comes to being safe online with sensitive data, whether that’s your personal data or sensitive data that is important to your organization, being informed is the first step. With that in mind, ahead of Data Privacy Day on January 28, we asked a handful of Netskopers from our CSO, internal security, and Netskope Threat Labs teams to provide tips around data privacy that they think everyone should know.

The Best Strategies for Security and Technology Leaders Managing in a Hybrid Work World

It should come as no surprise to anyone who has lived through the last three years that the way we work has changed drastically. The onset of the COVID-19 pandemic forced organizations to figure out how to better enable their employees to work from home securely and easily. The result was an acceleration of trends that were already underway. Work is now hybrid, and adaptability and flexibility continue to be key requirements for organizations working to secure a distributed hybrid workforce.