Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

An Inside Look at How to Keep Open Source Software Dependencies Up-to-Date and Secure

Today, open source software provides the foundation for the vast majority of applications across all industries, and software development has slowly moved toward software assembling. Because of this change in the way we deliver the software, new attack surfaces have evolved and software security is facing new challenges inherent with dependency on open source software.

4 Benefits CIOs Ought to Know About SSE

As a CIO it is very easy to get “new-acronym-deafness.” New innovations need new words and name-tags to identify them, and while analysts work hard to provide benchmarks and standardised definitions, it can be hard to keep up. At Netskope we know how confusing it can get, because sitting at the vanguard of emerging categories means we have had to do our fair share of explainers and re-labelling over recent years.

Introducing Netskope Borderless WAN

Security transformation doesn’t succeed without network transformation. The two go hand-in-hand when it comes to building the secure access service edge (SASE) architecture of the future, and if security degrades the network experience, or the network experience bypasses security, each of those trade-offs introduces more risk to the enterprise—it doesn’t have to be that way.

Transform Your Hybrid Work Model with SASE

The COVID-19 pandemic has indelibly changed the way we all work. As the world has opened back up and organizations have begun making the return to the office, many employees still want a hybrid work model. In an ideal hybrid working model, employees feel empowered and more productive given the freedom to do their work from any location or device, whenever it’s most convenient. Users need fast, secure access to their data, regardless of where their applications are located.

Cloud Threats Memo: Dropbox: Flexible Cloud Storage Increasingly Exploited by Attackers

Researchers from ESET have shed light on a new macOS backdoor, discovered in April 2022, dubbed CloudMensis. At first glance this is just the latest example of spyware targeting the Apple operating system with the intent of exfiltrating documents, keystrokes, and screen captures. However, as the name suggests, one of the interesting features of this malware is a sophisticated two-stage kill chain that exploits legitimate cloud services in different phases of the attack.

6 Key Considerations for Selecting a Zero Trust Network Access (ZTNA) Solution

Zero trust network access (ZTNA) has become a hot topic and a popular IT project. Here are some of the reasons why: First, organizations are beginning to pursue a zero trust strategy and ZTNA is the first logical step towards a zero trust security program. Second, remote or hybrid work is here to stay. And as a result, now is the time to replace your legacy remote access VPN with a modern anywhere secure access solution for the long term.

The EU's new AI Act-What We Can Learn From the GDPR

Artificial Intelligence (AI) is rapidly becoming ubiquitous in supporting key business decisions, and for many organisations it is critical for their digital transformation and new business models. With organisations quickly driving forward to identify new ways to extract competitive value from their data, the regulators are preparing to step in.

Should You Buy an SSE Product From a CASB, SWG, or ZTNA Vendor? The Answer May Surprise You.

After the introduction of security service edge (SSE) with the February 2022 release of the Gartner Magic Quadrant for SSE, organizations may be wondering how they should choose an SSE vendor from the many profiled in the Gartner report. Interestingly enough during this year’s Gartner Security and Risk Management Summit in June 2022,

Data Protection Is Not Just A Cyber Conversation

Before I became an advisor to Netskope, I was a long serving CIO and CEO for organisations including Bayer and Philips. I have spent many hours sitting in board meetings discussing data protection with colleagues and as a result I am confused by assertions I hear that data protection is only the IT team’s problem. In my experience, the majority of data protection conversations that reach the board are, in fact, driven by legal teams, who then partner with IT to devise and execute plans.