Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • Triaging Cloud Security in Four Steps

    Triaging Cloud Security in Four Steps

    With an average of more than 1,000 cloud services in use by enterprises, how do you triage your cloud security and streamline the process of applying compensating controls across so many cloud...

    Read Item
  • Latest Microsoft Office Zero-day Served via Godzilla Botnet

    Latest Microsoft Office Zero-day Served via Godzilla Botnet

    Netskope Threat Research Labs has discovered that the latest Microsoft Office zero-day vulnerability is linked to the Godzilla botnet loader discussed in our recent blog. During our research, we...

    Read Item
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Thank you!
    Error - something went wrong!
  • Analysis of the Godzilla Botnet Loader’s Evasive Techniques

    Analysis of the Godzilla Botnet Loader’s Evasive Techniques

    Netskope Threat Research Labs has recently observed a spam campaign using multi-vector attack methodology. The malicious files are zipped and sent in an email as an attachment. The ZIP file...

    Read Item
  • 7 Reasons to use Netskope Introspection for Slack

    7 Reasons to use Netskope Introspection for Slack

    Since its launch in 2014, Slack has grown rapidly, making its way into day-to-day use by enterprises large and small. More than just an instant messaging service, the ease with which Slack...

    Read Item
  • Macro-based Office Malware using Cloud Services

    Macro-based Office Malware using Cloud Services

    Netskope Threat Research Labs recently observed new strains of Microsoft Office macro-based document malware that extensively uses cloud storage services for downloading the second-stage malware...

    Read Item
  • It’s time to take GDPR seriously

    It’s time to take GDPR seriously

    The EU General Data Protection Regulation (GDPR) aims to better protect the privacy of personal data for EU citizens. It’s considered the world’s most significant — and aggressive — data privacy...

    Read Item
  • The Most Critical CASB Use Cases in the Market: Enforce Different Policies for Personal & Corporate Instances of the Same Cloud Service

    The Most Critical CASB Use Cases in the Market: Enforce Different Policies for Personal & Corporate Instances of the Same Cloud Service

    In our most recent Netskope Cloud Report, we reported that, for every sanctioned cloud storage service that an organization has, at least half of the users have a personal instance of the same...

    Read Item
  • Targeted Attack Campaigns with Multi-Variate Malware Observed in the Cloud

    Targeted Attack Campaigns with Multi-Variate Malware Observed in the Cloud

    Netskope Threat Research Labs has observed ongoing targeted attacks in enterprise cloud environments that lead to a malware fan-out effect through automated syncing and sharing of files in the...

    Read Item
  • Securing IaaS and PaaS — A Look Back at Three Years of Innovation

    Securing IaaS and PaaS — A Look Back at Three Years of Innovation

    Over the past several months we’ve been talking about the Critical CASB Use Cases  — there are 15 of these that we highlight, ranging from the management of unsanctioned versions of sanctioned...

    Read Item
  • Cloudbleed: Analysis of apps affected and what you can do about it

    Cloudbleed: Analysis of apps affected and what you can do about it

    On February 19, 2017, Tavis Ormandy from Google reported an incident relating to Cloudflare dumping un-initialized memory due to visiting, simply put, malformed HTML pages hosted behind the...

    Read Item
  • The Most Critical CASB Use Cases in the Market Today: Apply Encryption Based on Conditional Factors

    The Most Critical CASB Use Cases in the Market Today: Apply Encryption Based on Conditional Factors

      The Most Critical CASB Use Cases in the Market Today: Apply Encryption Based on Conditional Factors There are three massive trends that are on a collision course: Enterprises’ migration of...

    Read Item
  • RSA Conference 2017 Survey: Cloud Services, the New Administration and GDPR

    RSA Conference 2017 Survey: Cloud Services, the New Administration and GDPR

    A record number of more than 43,000 IT and security professionals attended RSA Conference two weeks ago in San Francisco. Whether discussing cyber policy, strategies for cloud management, or...

    Read Item
  • The Most Critical CASB Use Cases in the Market Today: Detect and Alert on User Login Anomalies

    The Most Critical CASB Use Cases in the Market Today: Detect and Alert on User Login Anomalies

    As an increasing number of threats find their way to cloud services, IT and security professionals are turning to their cloud access security broker (CASB) to help them protect their most valuable...

    Read Item
  • Netskope at RSA Conference 2017: Wednesday

    Netskope at RSA Conference 2017: Wednesday

    It’s huuuuuuump day, even if you’re not a camel! What’s going on in the Netskope booth today at S839 in Moscone South? Here’s the rundown: 10am. Netskope demo. Six highest-impact use cases...

    Read Item
  • Netskope at RSA Conference 2017: Tuesday

    Netskope at RSA Conference 2017: Tuesday

    It’s Tuesday, Red’s Tamales Day (if you’re from the Bay Area, you’ll recognize this reference)! What’s going on in the Netskope booth today at S839 in Moscone South? Here’s the rundown: 10am....

    Read Item
  • Netskope at RSA Conference 2017: Monday

    Netskope at RSA Conference 2017: Monday

    Happy Monday! As you get ready to participate in the largest security conference in the world, don’t forget to attend the cloud-focused Cloud Security Alliance Summit 2017: Securing the Converged...

    Read Item
  • Five Cloud Security “Must-Dos” at RSA Conference 2017

    Five Cloud Security “Must-Dos” at RSA Conference 2017

    Cloud security professionals are in for a treat at RSA Conference 2017. There is an enhanced and increased focus on cloud this year, from sessions to the Cloud Security Alliance’s cloud-focused...

    Read Item
  • Cloud CRM Services as a Malware Attack Vector

    Cloud CRM Services as a Malware Attack Vector

    Cloud Customer Relationship Management (CRM) services are broadly used, house organization’s most critical customer data, and deliver those data to corporate users via the web. Netskope Threat...

    Read Item
  • Decoys, RATs, and the Cloud: The growing trend

    Decoys, RATs, and the Cloud: The growing trend

    Netskope Threat Research Labs recently posted an article, detailing the CloudPhishing Fan-out resulting from Decoy PDF documents. We are observing a growing trend in the use of such PDF decoys...

    Read Item
  • The Most Critical CASB Use Cases in the Market Today: Enforce Conditional, Activity-level Policies

    The Most Critical CASB Use Cases in the Market Today: Enforce Conditional, Activity-level Policies

    As we wrap up our quarter and fiscal year this week at Netskope, I’ve been reflecting on our business metrics and how they have changed over the past year. Ninety percent of our customers chose to...

    Read Item
  • loading
    Loading More...