Latest Content

Find cloud security resources in this hub to get a deeper understanding of the cloud access security broker (CASB) space and how Netskope can help you understand activities, protect data, stop threats and respond to incidents

  • Web Security with Cloud Performance and Scale

    Web Security with Cloud Performance and Scale

    Wednesday, July 10th, 2019 | 10:00 am PST | Webinar

    View Now
  • Top 6 Questions To Ask Your Cloud DLP Vendor - Microsoft 365 Edition

    Top 6 Questions To Ask Your Cloud DLP Vendor - Microsoft 365 Edition

    View Now
  • 6 Common Cloud Security Use Cases

    View Guide
  • Optimized Security for Multi-Cloud IaaS Environments

    Optimized Security for Multi-Cloud IaaS Environments

    View this white paper to learn more about optimized security for multi-cloud IaaS environments.

    View Now
  • 6 Critical Steps to Securing Office 36555:35

    6 Critical Steps to Securing Office 365

    Watch Video
  • Optimizing Security Operations in a Cloud-First World47:53

    Optimizing Security Operations in a Cloud-First World

    Watch Video
  • Cloud Security Interactive Evaluator Guide

    Cloud Security Interactive Evaluator Guide

    Learn how to successfully deliver, deploy and test the six most common cloud security use cases.

    View Now
  • How to Protect Your Data in a Multi Cloud Environment56:31

    How to Protect Your Data in a Multi Cloud Environment

    Watch Video
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • 2019 Cloud Security Report

    2019 Cloud Security Report

    View this Cybersecurity Insiders report and learn how organizations are responding to evolving security threats in the cloud.

    View Now
  • Securing GCP: Top Ten Mistakes to Avoid

    Securing GCP: Top Ten Mistakes to Avoid

    Learn about the top 10 GCP security mistakes people make and how you can avoid them in this Whitepaper.

    View Now
  • 2018 Gartner Magic Quadrant for CASB

    2018 Gartner Magic Quadrant for CASB

    Read the 2018 Gartner Magic Quadrant and get an overview of the CASB market and evaluate strengths and cautions of all thirteen vendors in the space.

    View Now
  • Netskope Cloud Report - October 2018 - A Look at AWS

    Netskope Cloud Report - October 2018 - A Look at AWS

    In this Netskope Cloud Report™, we’ve compiled the most interesting trends on cloud service adoption and usage based on aggregated, anonymized data from the Netskope Security Cloud™.

    View Now
  • Advantages of Unifying Cloud and Web Security

    Advantages of Unifying Cloud and Web Security

    Learn about the advantages of unifying cloud and web security in your organization.

    View Now
  • 20 Examples of Smart Cloud Security

    20 Examples of Smart Cloud Security

    View Now
  • The Definitive CASB Business Case Kit - Presentation

    The Definitive CASB Business Case Kit - Presentation

    As #1 on Gartner’s information security agenda, CASB is a must-have. But is your business case lined up? Get started now with the definitive CASB business case starter kit. The kit includes: - The Gar

    View Now
  • 10 Questions to Ask Your Cloud Access Security Broker

    10 Questions to Ask Your Cloud Access Security Broker

    View Now
  • Customer Zero: a case study

    Customer Zero: a case study

    Being CISO for a security technology vendor can be an interesting position. My job combines the usual CISO responsibilities alongside daily self and industry analysis as I support our own product...

    View Now
  • Gartner, Infraestructura de TI, Operaciones y Estrategias de Cloud

    Gartner, Infraestructura de TI, Operaciones y Estrategias de Cloud

    June 25 - 26 | Mexico City, MX

    View Now
  • 6 Critical Steps to Securing Office 365 (Portuguese)49:41

    6 Critical Steps to Securing Office 365 (Portuguese)

    Watch Video
  • 6 Critical Steps to Securing Office 365(Spanish)47:52

    6 Critical Steps to Securing Office 365(Spanish)

    Watch Video
  • Cloud Security Use Case #2: Granular Control of Unmanaged Cloud Apps

    Cloud Security Use Case #2: Granular Control of Unmanaged Cloud Apps

    I recently blogged about the first of the six most common cloud security use cases that customers are covering with Netskope. I would like to continue the discussion and talk about use case #2,...

    View Now
  • The 3D approach to User Identity

    The 3D approach to User Identity

    Most of us are certainly familiar with the notion of 3D video.  It has gained tremendous popularity over the last decade, with more and more blockbuster motion pictures being screened in 3D.  Why...

    View Now
  • Cloud Security Use Case #1: Control Data Exposure

    Cloud Security Use Case #1: Control Data Exposure

    This is my fifth year at Netskope and it is awesome to see first-hand the rapid adoption of our ONECloud platform by some of the largest enterprises in the world. It is also interesting to see the...

    View Now
  • XXI Jornada Internacional de Seguridad de la Información de ISMS Forum

    XXI Jornada Internacional de Seguridad de la Información de ISMS Forum

    View Now
  • Google Storage Bucket Misconfiguration

    Google Storage Bucket Misconfiguration

    Rhino Labs recently released a tool for scanning Google Cloud Storage (GCS) buckets, called GCPBruteBucket. The tool gives users an easy way to search for publicly exposed buckets being hosted by...

    View Now
  • The Cyber Kill Chain in the Age of Cloud

    The Cyber Kill Chain in the Age of Cloud

    The cyber kill chain is used to model a cyber intrusion, identifying the different stages involved in a cyber-attack. The model is well established , but recently I have been asked multiple times...

    View Now
  • Ransomware Bulletin: LockerGoga

    Ransomware Bulletin: LockerGoga

    Executive Summary Netskope Threat Research Labs recently detected several strains of encrypted files across several cloud instances with the infamous LockerGoga Ransomware. The Ransomware was...

    View Now
  • Netskope Certified Cloud Associate Training - Orlando, FL

    Netskope Certified Cloud Associate Training - Orlando, FL

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Orlando, FL.

    View Now
  • Netskope Certified Cloud Associate Training - New York, NY

    Netskope Certified Cloud Associate Training - New York, NY

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in New York, NY.

    View Now
  • Netskope Certified Cloud Associate Training - Atlanta, GA

    Netskope Certified Cloud Associate Training - Atlanta, GA

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Atlanta, GA.

    View Now
  • Netskope Certified Cloud Associate Training - Dallas, TX

    Netskope Certified Cloud Associate Training - Dallas, TX

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Dallas, TX.

    View Now
  • Netskope Certified Cloud Associate Training - Denver, CO

    Netskope Certified Cloud Associate Training - Denver, CO

    Join a select group of security peers for our Netskope Certified Cloud Associate (NCCA) course in Denver, CO.

    View Now
  • CSA Group Case Study

    CSA Group Case Study

    CSA Group deployed the Netskope solution to reduce their risk of data exfiltration, malware, and data loss.

    View Now
  • SLUB’s the Word: Covert CnC over Slack

    SLUB’s the Word: Covert CnC over Slack

    In this post, we provide details of the SLUB backdoor, how it uses SaaS apps including Slack as a command and control channel, and how CASB controls can prevent this and similar threats from...

    View Now
  • Old Scams Getting New Life in the Cloud

    Old Scams Getting New Life in the Cloud

    Netskope Threat Research Labs has recently discovered a new technique being used by scammers to reach potential victims: send emails and SMS messages that include links to common services, such as...

    View Now
  • Top 6 Questions to Ask Your Cloud DLP Vendor: Robust DLP Capabilities

    Top 6 Questions to Ask Your Cloud DLP Vendor: Robust DLP Capabilities

    We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the fourth...

    View Now
  • loading
    Loading More...