Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing the edge with Zero Trust

The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Today, the network perimeter has evolved as workloads have moved to the cloud while non-managed, mobile devices have become the norm rather than the exception. The location of applications, users, and their devices are no longer static. Data is no longer confined to the corporate data center.

The Power of Data: Calendar-based Policy Enforcement

A problem that is often discussed in the context of policy-as-code is how to get more people other than developers involved in policy authoring. Policy as code is still code, and while tooling and abstractions can help to some extent, the process still involves at least some level of development knowledge.

Cybersecurity Awareness Month Isn't Just for Techies: Tips for Everyone

This month marks the 18th year of Cybersecurity Awareness Month (CSAM) which focuses on helping provide individuals with resources they need to stay safer and more secure online. Now, more than ever, the overarching theme “Do Your Part. #BeCyberSmart” should resonate with everyone.

How Cloud SOAR mitigates the cybersecurity skill gap problem in modern SOCs

Even though the cybersecurity skill gap dropped for the first time in recorded history in 2020, it is still one of the most pressing problems in the industry. Demand continues to eclipse the supply of skilled cybersecurity professionals. The scarcity of qualified security workers with the right skill set, experience, and talent means that critical vulnerabilities turn many organizations into sitting ducks in the eyes of hackers.

Explorer Walkthrough Quick Tour (Part 1)

Start building dashboards and widgets using the tools in Explore. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

SquirrelWaffle: New Malware Loader Delivering Cobalt Strike and QakBot

In September of 2021, a new malware family named SquirrelWaffle joined the threat landscape. It spread through infected Microsoft Office documents attached in spam emails. The infection flow starts with a ZIP file that contains the infected Office document. When the file is opened by the victim, the malicious VBA macros download SquirrelWaffle DLL, which eventually leads to deploying another threat, such as CobaltStrike or QakBot.