Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netskope Introduces Cloud Firewall-as-a-Service (FWaaS)

Change is the only constant and this is especially apparent for the firewall space, as we’ve seen with branch office transformation and users continuing to work remotely. Secure Access Service Edge (SASE) architecture, when properly designed, puts the user in the center with cloud edge security services protecting them, their data, and the apps and websites they use every day, on either company or personal instances.

The Need for SSPM in the Digital Transformation Journey

During this past year, organizations have moved towards the adoption of SaaS (software-as-a-service) applications like Microsoft O365, Salesforce, and GitHub at a more rapid pace than originally planned to help accommodate and facilitate the many employees that became remote workers, needing access to cloud applications from anywhere.

What are Mobile App Security Standards?

With an increasing overflow of threats and attacks on mobile apps, businesses are now more concerned than ever about making their apps safe and secure for their users. Even the apps which were deemed to be secure and impenetrable are now being crept into with severe vulnerabilities. And this is why there is a huge priority shift happening across the globe towards mobile app security. According to Gartner , the global market for information security is expected to cross a market cap of$170.4 billion.

Hacker-Powered Security

This episode is a deep dive into how startups can leverage the power of crowd sourced hackers to find bugs and security issues in your apps. Ben Sadeghipour has over 685 vulnerabilities found in major sites such as Snapchat, AirBnB and even the U.S. Department of Defense, Hacker One helps companies by providing tools to help with response assessments and running their bug bounty programs.

NC Protect for Microsoft 365 and SharePoint Advanced Information Protection & Compliance

Organizations have sensitive data spread across on-premises and cloud based platforms. This present a major challenge for IT to ensure data integrity and security. NC Protect is both content and context aware to automatically find, classify and secure unstructured data on-premises, in the cloud and in hybrid environments.

Devo Joins AWS ISV Workload Migration Program

Devo’s strong relationship with Amazon Web Services (AWS) recently expanded to include our participation in the AWS ISV Workload Migration Program. This is important to cloud developers, DevOps engineers, solution architects (particularly cloud SAs), and cybersecurity architects working at organizations ready to transition their data to the cloud.

Netskope Threat Coverage: LockBit

LockBit Ransomware(a.k.a. ABCD) is yet another ransomware group operating in the RaaS(Ransomware-as-a-Service) model, following the same architecture as other major threat groups, like REvil. This threat emerged in September 2019 and is still being improved by its creators. In June 2021, the LockBit group announced the release of LockBit 2.0, which included a new website hosted on the deep web, as well as a new feature to encrypt Windows domains using group policy.