Secure access service edge (SASE), as an architecture, is only three years old, but rapid adoption by organizations is making SASE one of the fastest-growing technology market categories in history. Functionally, SASE will change—and is already changing—how teams make security and networking technology purchases.
2012 was an interesting year. In the UK it was all Olympic Games and Golden Jubilees, while in the US, Barack Obama was reelected for a second term. The Mayan calendar came to an abrupt end—but the world did not—and we saw the final flight of NASA’s Space Shuttle. Amid all this, someone found the time to start up a new tech venture—a company anticipating massive transformation in networks, cloud, and cyber security. That company was Netskope.
By Nate Smolenski In May, the National Institute of Standards and Technology (NIST) released the white paper, “Planning for a Zero Trust Architecture,” which illustrates how agencies can make this transition by leveraging the seven steps of the NIST Risk Management Framework (RMF): Prepare, categorize, select, implement, assess, authorize, and monitor.
Digital transformation has highlighted a shift in value from the traditional, on-prem, legacy IT environment and physical distribution channels to the value being created by the scale of (customer) data and the ability to deliver a personalized service to customers in a trusted, secure, and private way.
Inflation, stagnation… even stagflation and recession… these are the words that look like they will define global economies in 2022 and into 2023. There’s barely a country that is being spared the crunch, and we are already seeing heated debate among global politicians as to the appropriate fiscal response. Do we spend or save our way out of this?
RedLine is an infostealer malware discovered in 2020. Often sold in underground forums, it is capable of stealing data such as credit card numbers, passwords, VPN and FTP credentials, gaming accounts, and even data from crypto wallets. In May 2022, Netskope Threat Labs analyzed a RedLine stealer campaign that was using YouTube videos to spread, luring victims into downloading a fake bot to automatically buy Binance NFT Mystery Boxes.
Internet-connected devices (also known as “the internet of things”) are a key business enabler for modern enterprises focused on transforming their businesses and gaining competitive advantage through automation and intelligent decision-making. According to IDC, there will be over 55.7 billion connected IoT devices (or “things”) by 2025, generating almost 80B zettabytes (ZB) of data.
In my previous blog, I covered the many different types of cyber threat intelligence and why gathering CTI is beneficial to security teams. In this post, I will dig into the cyber threat intelligence lifecycle framework and a model to help correlate and contextualize your findings.
From TVs to watches, fridges, lightbulbs, or coffee machines, it seems everything needs to be connected now to be marketable. The Internet of Things (IoT) environment is growing in homes and workplaces, but it has established itself way ahead of regulation. IoT devices do not currently have to comply with any specific cybersecurity standards and malicious actors are already making use of these endpoints.