Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • Security in a Multi-Cloud World

    Security in a Multi-Cloud World

    The world is going multi-cloud. The first thing to understand about this emerging strategy is that it’s very popular.  According to the 2018 Cloud Security Report, the growing trend is that...

    Read Item
  • Phishing in the public cloud: You’ve been served

    Phishing in the public cloud: You’ve been served

    Netskope Threat Protection recently detected an interesting PDF decoy hosted in Google Drive. The PDF decoy was impersonating a law firm in Denver, CO. The PDF decoy linked to an Office 365...

    Read Item
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • Announcing Netskope’s participation in the CSA GDPR Center of Excellence

    Announcing Netskope’s participation in the CSA GDPR Center of Excellence

    After years of deliberation, the GDPR is now a reality to businesses around the globe. Rather than simply seeing it as a necessary evil, we should remain mindful of the value to be gained from the...

    Read Item
  • What should security executives stop doing?

    What should security executives stop doing?

    As a CISO, it’s likely that you often hear about what you should be doing to protect your systems and data better: Buy this software. Deploy that system. Use this service. Hire these people, etc.....

    Read Item
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • Netskope Security Cloud – New feature spotlight for September

    Netskope Security Cloud – New feature spotlight for September

    Prior to Netskope, I worked for a company that was focused on launching innovative new features to the market one to two times per year. The process typically resulted in the delivery of one major...

    Read Item
  • Life @ Netskope with Andrea

    Life @ Netskope with Andrea

    In this Life @ Netskope, we talk to Andrea Schreiner our Central Channel Sales Director out of Frisco, Texas. In her two years at Netskope, Andrea has made a huge impact with the Netskope field...

    Read Item
  • New Report Spotlights Misconfigurations as the biggest threat to Cloud Security

    New Report Spotlights Misconfigurations as the biggest threat to Cloud Security

    It’s easy to assume that cloud service providers like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), are fully responsible for every aspect of cloud security....

    Read Item
  • Netskope and VMWare Workspace ONE integration – Launch and Take-off!

    Netskope and VMWare Workspace ONE integration – Launch and Take-off!

    Netskope is excited to be an inaugural member of the VMWare Workspace ONE Trust network. Together, we have tied innovative cloud-based actions to endpoint intelligence. As a follow-up to our March...

    Read Item
  • Why Netskope Acquired Sift Security: An Interview with Sanjay Beri and Neil King

    Why Netskope Acquired Sift Security: An Interview with Sanjay Beri and Neil King

    Earlier this month I had the chance to sit down with Sanjay Beri, the CEO of Netskope and the head of IaaS products, Neil King, who recently moved over to Netskope via the acquisition of Sift...

    Read Item
  • How to get the most out of public cloud and avoid configuration security data compromises

    How to get the most out of public cloud and avoid configuration security data compromises

    How to get the most out of public cloud Very few would dispute the notion that the public cloud, also known as infrastructure as a service (IaaS) platforms, have provided IT with a hugely powerful...

    Read Item
  • Smart Cloud Security: Recover from Cloud-based Ransomware Infections

    Smart Cloud Security: Recover from Cloud-based Ransomware Infections

    This is yet another post on ransomware – so we’ll keep this short. But, for cloud-first organizations, this post is an important one. Not only is ransomware hard to detect, but also hard to...

    Read Item
  • Enhancing the Netskope Security Cloud with Cylance partnership

    Enhancing the Netskope Security Cloud with Cylance partnership

    We’re happy to announce our partnership with Cylance, an industry leader in AI-driven threat protection. The threat landscape of cloud and web is constantly evolving – and to better protect our...

    Read Item
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • Netskope @ RSA Conference 2018 Asia Pacific & Japan

    Netskope @ RSA Conference 2018 Asia Pacific & Japan

    The RSA Conference 2018 Asia Pacific & Japan was held in Marina Bay Sands, Singapore from the 25 – 27 July. Several distinguished professionals from around the world attended the event, which...

    Read Item
  • Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud

    Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud

    The complexity of different types of malware continues to grow and zero-day malware is often missed by traditional security solutions. Often, zero-days will not become malicious until all the bits...

    Read Item
  • Life @ Netskope with Zach Jaca

    Life @ Netskope with Zach Jaca

    In this edition of Life @ Netskope, we talk to Zach Jaca, Mid-Market Account Executive. During his three years at Netskope Zach has been an advocate for company culture and activities, he’s...

    Read Item
  • Welcoming Sift Security to Netskope

    Welcoming Sift Security to Netskope

    Since the very beginning of Netskope, the entire team and I have always focused on building an independent, iconic security company legendary for solving the world’s toughest cybersecurity...

    Read Item
  • A six-step approach to Zero Trust in today’s perimeterless world

    A six-step approach to Zero Trust in today’s perimeterless world

    Zero Trust is a security concept that is centered around the belief that organizations should not trust anything inside or outside its perimeter and instead must verify anything trying to access...

    Read Item
  • Smart Cloud Security: Find and Protect Sensitive Data Embedded in Images

    Smart Cloud Security: Find and Protect Sensitive Data Embedded in Images

    One of the biggest concerns around cloud and web usage with our customers is sensitive data loss. And data loss can happen in myriad ways. A major concern from customers is data loss and...

    Read Item
  • New Report Links Positive Business Outcomes to More Mature Approach to Cloud Security

    New Report Links Positive Business Outcomes to More Mature Approach to Cloud Security

    Netskope just completed some interesting new research with Doug Cahill, a senior cybersecurity analyst at Enterprise Strategy Group (ESG). We partnered with Doug and the ESG team to conduct this...

    Read Item
  • Cryptojackers on the hunt for your IaaS resources

    Cryptojackers on the hunt for your IaaS resources

    Cryptojacking has become the favorite tool for cybercriminals to mine cryptocurrencies on the systems and/or computing resources hosted over IaaS infrastructures like Amazon AWS, Microsoft Azure,...

    Read Item
  • loading
    Loading More...