Latest Content

Find cloud security resources in this hub to get a deeper understanding of the cloud access security broker (CASB) space and how Netskope can help you understand activities, protect data, stop threats and respond to incidents

  • Netskope Cloud Report - August 2019

    Netskope Cloud Report - August 2019

    Cloud Services account for 85% of all enterprise web traffic.

    View Now
  • Delivering Real-time Cloud Security Without Trading Off Performance

    Delivering Real-time Cloud Security Without Trading Off Performance

    View Now
  • 6 Common Cloud Security Use Cases

    View Guide
  • Netskope NewEdge3:23

    Netskope NewEdge

    Watch Video
  • What’s the future of CASB and SWG42:56

    What’s the future of CASB and SWG

    Watch Video
  • Web Security with Cloud Performance and Scale41:59

    Web Security with Cloud Performance and Scale

    Watch Video
  • Top 6 Questions To Ask Your Cloud DLP Vendor - Microsoft 365 Edition

    Top 6 Questions To Ask Your Cloud DLP Vendor - Microsoft 365 Edition

    View Now
  • Optimized Security for Multi-Cloud IaaS Environments

    Optimized Security for Multi-Cloud IaaS Environments

    Learn how to deploy the Netskope platform to secure your growing off-premises workloads.

    View Now
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • 6 Critical Steps to Securing Office 36555:35

    6 Critical Steps to Securing Office 365

    Watch Video
  • Optimizing Security Operations in a Cloud-First World47:53

    Optimizing Security Operations in a Cloud-First World

    Watch Video
  • Cloud Security Interactive Evaluator Guide

    Cloud Security Interactive Evaluator Guide

    View Now
  • How to Protect Your Data in a Multi Cloud Environment56:31

    How to Protect Your Data in a Multi Cloud Environment

    Watch Video
  • 2019 CyberSecurity Insiders Cloud Security Report

    2019 CyberSecurity Insiders Cloud Security Report

    View Now
  • Securing GCP: Top Ten Mistakes to Avoid

    Securing GCP: Top Ten Mistakes to Avoid

    View Now
  • 2018 Gartner Magic Quadrant for CASB

    2018 Gartner Magic Quadrant for CASB

    View Now
  • Advantages of Unifying Cloud and Web Security

    Advantages of Unifying Cloud and Web Security

    View Now
  • Netskope Cloud Report - October 2018 - A Look at AWS

    Netskope Cloud Report - October 2018 - A Look at AWS

    View Now
  • 20 Examples of Smart Cloud Security

    20 Examples of Smart Cloud Security

    View Now
  • The Definitive CASB Business Case Kit - Presentation

    The Definitive CASB Business Case Kit - Presentation

    View Now
  • 10 Questions to Ask Your Cloud Access Security Broker

    10 Questions to Ask Your Cloud Access Security Broker

    View Now
  • Evalueserve Case Study

    Evalueserve Case Study

    View Now
  • Defson 27 - Exploiting AWS Loopholes

    Defson 27 - Exploiting AWS Loopholes

    Defcon 27 talk

    View Now
  • Defcon 27 - The Future of Command and Control

    Defcon 27 - The Future of Command and Control

    Defcon 27 talk

    View Now
  • Defcon 27 - Phishing in the Cloud Era

    Defcon 27 - Phishing in the Cloud Era

    Defcon 27 talk

    View Now
  • Defcon 27 - Exploiting IAM in GCP

    Defcon 27 - Exploiting IAM in GCP

    Defcon 27 talk

    View Now
  • Gartner Security & Risk Management Summit

    Gartner Security & Risk Management Summit

    August 26-27 | Mumbai, India

    View Now
  • VMworld

    VMworld

    August 25-28 | San Francisco, CA

    View Now
  • Defcon Cloud Village – Phishing in the Cloud Era

    Defcon Cloud Village – Phishing in the Cloud Era

    The DEFCON27 computer security conference is one of the world’s largest and reputed hacker conventions that will be held from August 8th to August 11th in Las Vegas, Nevada. This event consists of...

    View Now
  • Why the Future of Command and Control is the Cloud

    Why the Future of Command and Control is the Cloud

    Cloud adoption has grown dramatically within the enterprise and shows no signs of stopping. Many cloud services such as Github, Slack, Dropbox, and others are part of everyday business and...

    View Now
  • AWS Loopholes with Temporary Credentials

    AWS Loopholes with Temporary Credentials

    If you don’t already have a plan for managing temporary credentials, or tokens in your AWS environment, you need one ASAP. Temporary tokens can be a security nightmare because: They provide nearly...

    View Now
  • Permission Isolation in GCP

    Permission Isolation in GCP

    When Identity and Access Management (IAM) permissions are not sufficiently isolated using the structure provided by the Google Cloud Platform (GCP), the results could be disastrous. Ideally, if...

    View Now
  • Pardot CRM Attack

    Pardot CRM Attack

    On 5 August 2019, Netskope Threat Research Labs discovered an attack campaign propagated through Pardot, a cloud-based Customer Relationship Management (CRM) by Salesforce. The attack kill chain...

    View Now
  • Netskope Certified Cloud Associate Training - San Diego, CA

    Netskope Certified Cloud Associate Training - San Diego, CA

    View Now
  • Quandaries and Clouds: A Discussion on Cloud Security1:03:01

    Quandaries and Clouds: A Discussion on Cloud Security

    Watch Video
  • Netskope Cloud Report - August 2019

    Netskope Cloud Report - August 2019

    View Now
  • Netskope Cloud Report: Web traffic has significantly shifted to cloud

    Netskope Cloud Report: Web traffic has significantly shifted to cloud

    We recently released the August 2019 edition of the Netskope Cloud Report. Beginning with this cloud report, we are offering an expanded view of enterprise internet traffic. This is the result of...

    View Now
  • Netskope Certified Cloud Associate Training - Burlington, MA

    Netskope Certified Cloud Associate Training - Burlington, MA

    View Now
  • DEF CON

    DEF CON

    August 8-11 | Las Vegas, NV

    View Now
  • AWS S3 Logjam: Server Access Logging vs. Object-Level Logging

    AWS S3 Logjam: Server Access Logging vs. Object-Level Logging

    In AWS, there are two ways to log access to S3 storage resources,  i.e. buckets and bucket objects:  server access logging (https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerLogs.html) bucket...

    View Now
  • Netskope and Crowdstrike

    Netskope and Crowdstrike

    View Now
  • loading
    Loading More...