Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • Enhancing the Netskope Security Cloud with Cylance partnership

    Enhancing the Netskope Security Cloud with Cylance partnership

    We’re happy to announce our partnership with Cylance, an industry leader in AI-driven threat protection. The threat landscape of cloud and web is constantly evolving – and to better protect our...

    Read Item
  • Netskope @ RSA Conference 2018 Asia Pacific & Japan

    Netskope @ RSA Conference 2018 Asia Pacific & Japan

    The RSA Conference 2018 Asia Pacific & Japan was held in Marina Bay Sands, Singapore from the 25 – 27 July. Several distinguished professionals from around the world attended the event, which...

    Read Item
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud

    Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud

    The complexity of different types of malware continues to grow and zero-day malware is often missed by traditional security solutions. Often, zero-days will not become malicious until all the bits...

    Read Item
  • Life @ Netskope with Zach Jaca

    Life @ Netskope with Zach Jaca

    In this edition of Life @ Netskope, we talk to Zach Jaca, Mid-Market Account Executive. During his three years at Netskope Zach has been an advocate for company culture and activities, he’s...

    Read Item
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • Welcoming Sift Security to Netskope

    Welcoming Sift Security to Netskope

    Since the very beginning of Netskope, the entire team and I have always focused on building an independent, iconic security company legendary for solving the world’s toughest cybersecurity...

    Read Item
  • A six-step approach to Zero Trust in today’s perimeterless world

    A six-step approach to Zero Trust in today’s perimeterless world

    Zero Trust is a security concept that is centered around the belief that organizations should not trust anything inside or outside its perimeter and instead must verify anything trying to access...

    Read Item
  • Smart Cloud Security: Find and Protect Sensitive Data Embedded in Images

    Smart Cloud Security: Find and Protect Sensitive Data Embedded in Images

    One of the biggest concerns around cloud and web usage with our customers is sensitive data loss. And data loss can happen in myriad ways. A major concern from customers is data loss and...

    Read Item
  • New Report Links Positive Business Outcomes to More Mature Approach to Cloud Security

    New Report Links Positive Business Outcomes to More Mature Approach to Cloud Security

    Netskope just completed some interesting new research with Doug Cahill, a senior cybersecurity analyst at Enterprise Strategy Group (ESG). We partnered with Doug and the ESG team to conduct this...

    Read Item
  • Cryptojackers on the hunt for your IaaS resources

    Cryptojackers on the hunt for your IaaS resources

    Cryptojacking has become the favorite tool for cybercriminals to mine cryptocurrencies on the systems and/or computing resources hosted over IaaS infrastructures like Amazon AWS, Microsoft Azure,...

    Read Item
  • Life @ Netskope with Bhumika

    Life @ Netskope with Bhumika

    In our very first edition of Life @ Netskope, we talk to Bhumika Kapadia, Senior Director of Product Management, or as most of us know her, the Chief Ice Cream Officer (CICO). In her two years at...

    Read Item
  • Step aside ransomware: Why cryptojacking is the new kid on the block

    Step aside ransomware: Why cryptojacking is the new kid on the block

    With the ability to generate a staggering $1.5 trillion in revenues every year, cybercrime is big business. It’s the perfect model – earn a high income for minimum effort and risk of penalty. It...

    Read Item
  • Envisioning and delivering stronger, collaborative security from cloud to endpoint

    Envisioning and delivering stronger, collaborative security from cloud to endpoint

    Generational wisdom has always held that there is strength in unity. When it comes to security products and defending against malicious actors, every security practitioner would point out that...

    Read Item
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Netskope would like to ​send you additional marketing information and ​share your personal data with our trusted third-parties for marketing purposes. ​Please check the box to ​opt-in and agree to our privacy policy ​which includes instructions on how to opt-out at any time​.
    Yes, I am opting in and agree with Netskope's privacy policy.
    Thank you!
    Error - something went wrong!
  • Technical Analysis of Xbooster parasitic Monero Miner

    Technical Analysis of Xbooster parasitic Monero Miner

    We recently published an article about the Xbooster parasitic malware campaign that uses Amazon Web Services (AWS) to deliver the payloads and exfiltrate victims host details. This blog will...

    Read Item
  • Fishing for data loss and unexpectedly catching malware

    Fishing for data loss and unexpectedly catching malware

    We are starting to see a trend develop with Netskope customers who initially focus on a set of cloud security use cases, then end up expanding their use case coverage based on what was uncovered...

    Read Item
  • Reporting: the final piece of the GDPR puzzle

    Reporting: the final piece of the GDPR puzzle

    Reporting might be the final of the four stages of GDPR compliance, and it’s possibly not a topic which is going to set anyone’s world alight, but neither of those things make it any less...

    Read Item
  • Xbooster Parasitic Monero Mining Campaign

    Xbooster Parasitic Monero Mining Campaign

    Netskope Threat Research Labs discovered a parasitic Monero mining malware campaign named xbooster that was successful in generating close to $100,000 USD using multiple Monero accounts. The...

    Read Item
  • Smart Cloud Security: How to Protect Against Password Email Abuse

    Smart Cloud Security: How to Protect Against Password Email Abuse

    Raise your hand if you’ve ever shared passwords through email when a colleague asks for the credentials to a shared cloud service? I know I’ve been guilty of it. It’s easy and quick to be able to...

    Read Item
  • Resurgence of Phishing-as-a-Service (PhaaS) platforms

    Resurgence of Phishing-as-a-Service (PhaaS) platforms

    Last year, Netskope Threat Research Labs discovered Hackshit Phishing as a Service (PhaaS) platform that recorded the victims credentials via websocket service hosted in Amazon S3. Eventually,...

    Read Item
  • Netskope Discovers ATMJackpot Siphoning Cash

    Netskope Discovers ATMJackpot Siphoning Cash

    Netskope Threat Research Labs has discovered a new ATM malware, “ATMJackpot.” The malware seems to have originated from Hong Kong and has a time stamp on the binary as 28th March 2018. It is...

    Read Item
  • Promote workplace productivity and security with Netskope and VMware Workspace ONE

    Promote workplace productivity and security with Netskope and VMware Workspace ONE

    In today’s mobile and cloud world, securing sensitive data across SaaS, IaaS, and PaaS as part of the digital workspace experience is critical. The integration between Netskope and VMware...

    Read Item
  • loading
    Loading More...