Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netskope

The Evolving Role of CISOs in an AI-enhanced Cybersecurity World

As businesses increasingly rely on digital infrastructures, the threats that aim to exploit these technologies also evolve. It’s no longer just about safeguarding against unauthorized access; it’s about understanding and mitigating the complex risks introduced by AI and machine learning—topics I’ve often discussed, emphasizing the need for an advanced cybersecurity strategy that evolves as quickly as the technologies it aims to protect.

Cloud Threats Memo: CloudSorcerer, a Recently Discovered APT, is Exploiting Multiple Legitimate Cloud Services

A recently discovered advanced persistent threat (APT) provides a particularly meaningful example of how multiple cloud services can be combined inside the same attack chain to add layers of sophistication and evasion. CloudSorcerer is the name that researchers at Kaspersky have coined to describe an advanced threat actor targeting Russian government entities.

10 Thought-provoking Questions to Contemplate GenAI Data Security

In the age of generative AI, data security is a key concern for organizations to manage. In my previous blog post, I dug into how modern SSE technology helps to better secure genAI. The recently published ebook Securing GenAI for Dummies offers further clarity on strategies organizations can use when it comes to securing and enabling genAI apps. With that in mind, we’ve compiled 10 essential questions to keep in mind as you assess your data security, along with how Netskope can help address them.

The Significance of the Number 42 in the New ISO AI Standard

The number 42 has gained legendary status in popular culture, largely due to Douglas Adams’ science fiction series, The Hitchhiker’s Guide to the Galaxy. In this series, a group of hyper-intelligent beings build a supercomputer named Deep Thought to calculate the “Answer to the Ultimate Question of Life, the Universe, and Everything”. After much contemplation, Deep Thought reveals the answer to be simply “42”.

How to Navigate Data Security in the GenAI Era

Since its mainstream emergence in 2022, generative AI has triggered a seismic shift in data management and security. It is estimated that one in four employees now uses genAI apps daily, often unbeknownst to their employer and IT team. This raises concerns, as genAI is designed with a voracious appetite for consuming both mundane and sensitive data. Effectively securing your data as genAI becomes prevalent is a strategic imperative.

The Odd One Out: Unleashing the Power of the Unpopular Opinion

CISOs today intersect with all facets of the business, whether that be liaising with network teams to manage performance, or balancing the costs of IT operations to avoid isolation from core business functions. Successful CISOs navigate these intersections by adopting proactive strategies in order to transition from a back-office role and become recognised as valued strategic partners within their organisations.

How Can CISOs Elevate Their Contribution Within the C-suite?

Businesses manage a series of balancing acts every day—between innovation and reliability, for instance, investment or profit, speed or security. Each leader contributes to how decisions are weighed and made, and traditionally CISOs have been expected to operate at one end of that scale, as the chief protector of the business.

Stop Letting Security Audits Go to Waste-They're More Than Just a Checkbox Exercise

Over the past two decades, data has become a critical asset for nearly every organisation. Consequently, a variety of regulations and industry standards now govern business operations. In today’s data-driven age, certification through security audits serves as a testament to an organisation’s adherence to industry standards, regulations, and security measures.