Latest Content

Find cloud security resources in this hub to get a deeper understanding of the cloud access security broker (CASB) space and how Netskope can help you understand activities, protect data, stop threats and respond to incidents

  • Cloud Security Interactive Evaluator Guide

    Cloud Security Interactive Evaluator Guide

    Learn how to successfully deliver, deploy and test the six most common cloud security use cases.

    View Now
  • 2019 Cloud Security Report

    2019 Cloud Security Report

    View this Cybersecurity Insiders report and learn how organizations are responding to evolving security threats in the cloud.

    View Now
  • 6 Common Cloud Security Use Cases

    View Guide
  • Gartner names Netskope a leader again

    Gartner names Netskope a leader again

    Gartner recently released the latest version of their Magic Quadrant for Cloud Access Security Brokers (CASBs) and for the second consecutive year Netskope was named as a leader positioned...

    View Now
  • Netskope Cloud Report - October 2018 - A Look at AWS

    Netskope Cloud Report - October 2018 - A Look at AWS

    In this Netskope Cloud Report™, we’ve compiled the most interesting trends on cloud service adoption and usage based on aggregated, anonymized data from the Netskope Security Cloud™.

    View Now
  • Netskope recognized as a leader in Gartner Magic Quadrant for CASB

    Netskope recognized as a leader in Gartner Magic Quadrant for CASB

    Gartner recently released its first-ever Magic Quadrant for Cloud Access Security Brokers (CASBs) and I’m delighted to share with you that Netskope has been recognized as a leader. In addition to...

    View Now
  • 20 Examples of Smart Cloud Security

    20 Examples of Smart Cloud Security

    View Now
  • CASB RFP Template

    CASB RFP Template

    CASB RFP Template, CASB RFI Template, CASB RFQ Template

    View Now
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • Optimizing Security Operations in a Cloud-First World47:53

    Optimizing Security Operations in a Cloud-First World

    Watch Video
  • The 3D approach to User Identity

    The 3D approach to User Identity

    Most of us are certainly familiar with the notion of 3D video.  It has gained tremendous popularity over the last decade, with more and more blockbuster motion pictures being screened in 3D.  Why...

    View Now
  • Cloud Security Use Case #1: Control Data Exposure

    Cloud Security Use Case #1: Control Data Exposure

    This is my fifth year at Netskope and it is awesome to see first-hand the rapid adoption of our ONECloud platform by some of the largest enterprises in the world. It is also interesting to see the...

    View Now
  • Segurinfo Paraguay 2019, May 30, 2019 - Paraguay

    Segurinfo Paraguay 2019, May 30, 2019 - Paraguay

    View Now
  • XXI Jornada Internacional de Seguridad de la Información de ISMS Forum

    XXI Jornada Internacional de Seguridad de la Información de ISMS Forum

    View Now
  • IT Masters CON Monterrey, May 15, 2019 - Monterrey, Mexico

    IT Masters CON Monterrey, May 15, 2019 - Monterrey, Mexico

    View Now
  • Japan Launch Event, May 29, 2019 - Tokyo, Japan

    Japan Launch Event, May 29, 2019 - Tokyo, Japan

    View Now
  • Google Storage Bucket Misconfiguration

    Google Storage Bucket Misconfiguration

    Rhino Labs recently released a tool for scanning Google Cloud Storage (GCS) buckets, called GCPBruteBucket. The tool gives users an easy way to search for publicly exposed buckets being hosted by...

    View Now
  • The Cyber Kill Chain in the Age of Cloud

    The Cyber Kill Chain in the Age of Cloud

    The cyber kill chain is used to model a cyber intrusion, identifying the different stages involved in a cyber-attack. The model is well established , but recently I have been asked multiple times...

    View Now
  • Ransomware Bulletin: LockerGoga

    Ransomware Bulletin: LockerGoga

    Executive Summary Netskope Threat Research Labs recently detected several strains of encrypted files across several cloud instances with the infamous LockerGoga Ransomware. The Ransomware was...

    View Now
  • Netskope Certified Cloud Associate Training - Orlando, FL

    Netskope Certified Cloud Associate Training - Orlando, FL

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Orlando, FL.

    View Now
  • Netskope Certified Cloud Associate Training - New York, NY

    Netskope Certified Cloud Associate Training - New York, NY

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in New York, NY.

    View Now
  • Netskope Certified Cloud Associate Training - Atlanta, GA

    Netskope Certified Cloud Associate Training - Atlanta, GA

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Atlanta, GA.

    View Now
  • Netskope Certified Cloud Associate Training - Dallas, TX

    Netskope Certified Cloud Associate Training - Dallas, TX

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Dallas, TX.

    View Now
  • Netskope Certified Cloud Associate Training - Denver, CO

    Netskope Certified Cloud Associate Training - Denver, CO

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Denver, CO.

    View Now
  • CSA Group Case Study

    CSA Group Case Study

    CSA Group deployed the Netskope solution to reduce their risk of data exfiltration, malware, and data loss.

    View Now
  • SLUB’s the Word: Covert CnC over Slack

    SLUB’s the Word: Covert CnC over Slack

    In this post, we provide details of the SLUB backdoor, how it uses SaaS apps including Slack as a command and control channel, and how CASB controls can prevent this and similar threats from...

    View Now
  • Old Scams Getting New Life in the Cloud

    Old Scams Getting New Life in the Cloud

    Netskope Threat Research Labs has recently discovered a new technique being used by scammers to reach potential victims: send emails and SMS messages that include links to common services, such as...

    View Now
  • Top 6 Questions to Ask Your Cloud DLP Vendor: Robust DLP Capabilities

    Top 6 Questions to Ask Your Cloud DLP Vendor: Robust DLP Capabilities

    We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the fourth...

    View Now
  • Netskope Certified Cloud Associate Training - Minneapolis, MN

    Netskope Certified Cloud Associate Training - Minneapolis, MN

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Minneapolis, MN.

    View Now
  • loading
    Loading More...