Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • Cloud Security Use Case #2: Granular Control of Unmanaged Cloud Apps

    Cloud Security Use Case #2: Granular Control of Unmanaged Cloud Apps

    I recently blogged about the first of the six most common cloud security use cases that customers are covering with Netskope. I would like to continue the discussion and talk about use case #2,...

    View Now
  • The 3D approach to User Identity

    The 3D approach to User Identity

    Most of us are certainly familiar with the notion of 3D video.  It has gained tremendous popularity over the last decade, with more and more blockbuster motion pictures being screened in 3D.  Why...

    View Now
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • Cloud Security Use Case #1: Control Data Exposure

    Cloud Security Use Case #1: Control Data Exposure

    This is my fifth year at Netskope and it is awesome to see first-hand the rapid adoption of our ONECloud platform by some of the largest enterprises in the world. It is also interesting to see the...

    View Now
  • Google Storage Bucket Misconfiguration

    Google Storage Bucket Misconfiguration

    Rhino Labs recently released a tool for scanning Google Cloud Storage (GCS) buckets, called GCPBruteBucket. The tool gives users an easy way to search for publicly exposed buckets being hosted by...

    View Now
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • The Cyber Kill Chain in the Age of Cloud

    The Cyber Kill Chain in the Age of Cloud

    The cyber kill chain is used to model a cyber intrusion, identifying the different stages involved in a cyber-attack. The model is well established , but recently I have been asked multiple times...

    View Now
  • Ransomware Bulletin: LockerGoga

    Ransomware Bulletin: LockerGoga

    Executive Summary Netskope Threat Research Labs recently detected several strains of encrypted files across several cloud instances with the infamous LockerGoga Ransomware. The Ransomware was...

    View Now
  • SLUB’s the Word: Covert CnC over Slack

    SLUB’s the Word: Covert CnC over Slack

    In this post, we provide details of the SLUB backdoor, how it uses SaaS apps including Slack as a command and control channel, and how CASB controls can prevent this and similar threats from...

    View Now
  • Old Scams Getting New Life in the Cloud

    Old Scams Getting New Life in the Cloud

    Netskope Threat Research Labs has recently discovered a new technique being used by scammers to reach potential victims: send emails and SMS messages that include links to common services, such as...

    View Now
  • Top 6 Questions to Ask Your Cloud DLP Vendor: Robust DLP Capabilities

    Top 6 Questions to Ask Your Cloud DLP Vendor: Robust DLP Capabilities

    We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the fourth...

    View Now
  • Sharing vital cloud security information: An Interview with Estee Lauder’s Security and Risk Thought Leader

    Sharing vital cloud security information: An Interview with Estee Lauder’s Security and Risk Thought Leader

    Security and Risk thought leader Les Correia wears many hats with one mission: Protecting Estee Lauder’s critical assets from the risk of a security breach. He is part of a team that guides many...

    View Now
  • A Malicious Sight in Google Sites

    A Malicious Sight in Google Sites

    Netskope Threat Research Labs discovered an interesting drive-by download attack in Google. The threat actor involved in this attack initially deployed a Banking Trojan using the file cabinets...

    View Now
  • Top 6 Questions to Ask Your Cloud DLP Vendor: Public Cloud

    Top 6 Questions to Ask Your Cloud DLP Vendor: Public Cloud

    We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the third...

    View Now
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • New Home, Same Wonderful Culture

    New Home, Same Wonderful Culture

    Earlier this year I had the opportunity to lead our official ribbon cutting ceremony for the new Netskope HQ in Santa Clara, California. As you’ll observe from the video, the team had a great time...

    View Now
  • New report tackles the issues and opportunities of cloud security

    New report tackles the issues and opportunities of cloud security

    While cloud service providers like Google Cloud Platform (GCP), Amazon Web Services (AWS), and Microsoft Azure have continued to expand their service offerings to protect their evolving assets,...

    View Now
  • Protecting against employees that ‘never shut up’ in Slack

    Protecting against employees that ‘never shut up’ in Slack

    An Interesting article was published this week on CNBC about how the use of Slack worries some CEOs who say that employees ‘never shut up’ on the app. This is another example of a cloud app that...

    View Now
  • Top 6 Questions to Ask Your Cloud DLP Vendor: Shadow IT

    Top 6 Questions to Ask Your Cloud DLP Vendor: Shadow IT

    We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the second...

    View Now
  • Netskope Security Cloud – Chrome OS Support

    Netskope Security Cloud – Chrome OS Support

    In our most recent release, Netskope has added support for the Chrome Operating System. With the ability to secure cloud application access from Google’s ultra-lightweight end point, Netskope is...

    View Now
  • The case for making security MORE visible

    The case for making security MORE visible

    Traditional information security should, it has been argued, be like Victorian children; best kept out of sight.  Most CISOs aim for security that is invisible to the end user, working away in the...

    View Now
  • How Netskope stops sensitive data being exposed publicly in Box

    How Netskope stops sensitive data being exposed publicly in Box

    Another example of public shares of personal data surfaced this week when security firm Adversis discovered hundreds of Box customers had hundreds of thousands of documents and terabytes of data...

    View Now
  • The Common Myths of AWS Security

    The Common Myths of AWS Security

    Recently, at a Netskope security forum, we had the opportunity to launch into conversations with leading CISOs about trends in enterprise security. During the discussion, a Chief Information...

    View Now
  • loading
    Loading More...