Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Threats Memo: Exploiting Google Forms for Phishing Campaigns

A recent campaign, unearthed by researchers at INKY, is the latest example of exploitation of a legitimate cloud service. The campaign impersonates the U.S. Small Business Administration (SBA), targeting small businesses that are unaware of the fact that the SBA recently stopped accepting applications for COVID-19 relief loans or grants. The element that makes this campaign stand out from the others is the exploitation of a well-known and familiar cloud service to host the phishing page: Google Forms.

Netskope and Okta: Coming Together for Continuous Adaptive Trust

The problem of securing the modern workforce goes beyond occasional spats between IT and security. The real problems we see are user credentials under constant attack, alongside attempts to harvest and exploit enterprise data. Plus the cloud resources that workforces need are tough to secure, especially when deployed outside of IT-led processes. In light of these issues, corporations need a way to securely provide always-on cloud access for users while safeguarding enterprise data anywhere it goes.

Cybersecurity Awareness Month: Adding Threat to Vulnerability Management

Vulnerability management can be more than just running scans and sorting by Common Vulnerability Scoring System scores! Take your program to the next level by adding a threat-based approach to vulnerability management by combining the hacker mindset with cyber threat intelligence. With so many vulnerabilities published daily, having a team knowledgeable with the latest threats can help IT teams quickly identify assets that require expedited remediation.

Cybersecurity Awareness Month: Recognizing Phishing and Using Multi-factor Authentication

Phishing is a well known threat that users are constantly being warned about, but as we are in Cybersercurity Awarenss Month though, some may still be wondering what exactly phishing is and how to prevent it. In this blog, I am going to dig into how you can recognize phishing and how enabling multi-factor authentication can help keep you safe.

Making Sense of Zero Trust Through the Lens of Networking and Infrastructure

“Zero trust” still confuses people—and for good reason. While the term conveys a certain absolute authority (“zero,” “nope,” “nothing”), contemporary approaches offer much more nuanced capabilities. And while zero trust today is typically associated with security initiatives, the concepts have their origin in the definition of network perimeters, who is granted access, and how that access is provided.

What is Security Service Edge (SSE)

What is Security Service Edge (SSE)? Why are legacy security architectures no longer effective? Clear up the confusion and learn about this emerging category that helps improve user experience and security with help from Netskope's Vice President and Chief Evangelist, Bob Gilbert. Intelligent SSE from Netskope is redefining cloud, network, data security.

Cybersecurity Awareness Month: Answering 3 Big Questions About Secure Passwords

Passwords have been employed by many since the days of the Roman Empire, and they quickly became omnipresent as we approached the digital age. However, rapid changes in the security landscape have forced us to evolve what our passwords look like and how they are used. At times, this has led to conflicting advice and confusion on what proper password management looks like. By clarifying how to best create and use passwords, we can make it easier for people to stay safe online.

Looking Back at the Last Decade of Technology

Here at Netskope we are celebrating our 10th anniversary this month, but while our story over that decade is very cool, any blog about it will be of limited interest outside of our own employee base. I wanted to add a different lens to our internal observations and so I started to refresh my memory with research into exactly what went on over those years while we were beavering away to build the best SASE platform in the world.