Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netskope

Cloud Threats Memo: Extracting Training Data from Generative AI Language Models

This year will probably be remembered for the revolution of ChatGPT (the website was visited by 1.7 billion users in October 2023, with 13.73% of growth compared to the previous month) and for the widespread adoption of generative AI technologies in our daily life.

The Winter Wonderland of Cyber Threats

It’s the season for mince pies, tinsel and, of course, holiday shopping. I am in the Middle East so temperatures are quite pleasant for a mall stroll while shopping for family gifts, but it’s certainly odd hearing Mariah Carey being played and seeing fake snow on Christmas trees when it’s 25 degrees outside. While I prefer to do my shopping in person, around the world the majority of festive shopping happens on mobiles and laptops.

Netskope NewEdge Network Delivers Security Here, There, and Everywhere!

A common theme we hear from organizations utilizing a cloud delivered web proxy, either standalone or part of an SSE or SASE platform, is the frustration caused by website localization issues, a common trade-off when using services hosted in different geographies to the user. This is more acute the larger the customer is and the wider the distribution of employees beyond their home country or smaller organizations located in countries with no large scale data center (DC) infrastructure.

Zero Trust and (Why It Isn't Always About) Identity

What is the relationship between zero trust and user identity? There’s no doubt that identity is a fundamental component of an effective zero trust approach, but there is also a danger that organisations become so overly focused on this one element, they forget there are others. To believe that achieving zero trust is all about user identity is, I believe, a fundamental misunderstanding of the concept.

Five Threats Predictions To Note For 2024

As a continuation of our ongoing series collecting predictions from our many subject-matter experts here at Netskope, we headed down the (metaphorical) corridor to the Threat Labs. We wanted to extract from them some threats and cyberattack-related predictions, based on what they are starting to see evolving in the landscape. We’ve got a great selection, covering generative AI, software supply chain, and social engineering. Strap in!

What's in Store for 2024: Predictions About Zero Trust, AI, and Beyond

With 2024 on the horizon, we have once again reached out to our deep bench of experts here at Netskope to ask them to do their best crystal ball gazing and give us a heads up on the trends and themes that they expect to see emerging in the new year. We’ve broken their predictions out into four categories: AI, Geopolitics, Corporate Governance, and Skills. Here’s what our experts think is in store for 2024.

Digital Trust: Why SEO Poisoning is on the Rise

In the digital age, human interactions have been slowly replaced with online substitutions. We’re so used to depending on computers to perform tasks on our behalf that attackers are increasingly exploiting this trust mechanism for malicious gain. We are living in an age of unprecedented connectivity and convenience. Our daily lives are entwined with technology, from online shopping to managing our finances, to discussing key documents and answering queries in the workplace.

Welcome to the Future of SD-WAN - The Next Gen SASE Branch

It’s been a long journey toward securing and optimizing the enterprise branch, from the days of rigid MPLS networks to the agile era of SD-WAN. Now comes the next stage of that journey: Secure access service edge (SASE), which, when architected correctly, converges the most important network and security capabilities into a single cloud-delivered service. Before we talk about how, though, let’s examine why SASE’s moment is now.