Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • Bringing the Second Netskope Patent to Life: The Life of a Cloud Transaction

    Bringing the Second Netskope Patent to Life: The Life of a Cloud Transaction

    Today, we announced that we have been issued our second comprehensive CASB patent for delivering granular visibility and enforcing granular policy and data security for cloud delivered services....

    Read Article
  • Gartner Report: Market Guide for Cloud Access Security Brokers

    Get Your Copy
  • Netskope Threat Research Labs Technical Analysis: CloudSquirrel Malware

    Netskope Threat Research Labs Technical Analysis: CloudSquirrel Malware

    Visual depiction of the life cycle of the Cloud Squirrel Attack Last week we posted an article, giving an overview about the CloudSquirrel malware campaign that takes advantage of multiple cloud...

    Read Article
  • 5 tips for using a CASB to safely enable social media in your business

    5 tips for using a CASB to safely enable social media in your business

    From Facebook’s 1.65 billion monthly active users to Twitter’s rise as a mainstream broadcast media outlet, social media continues to experience rapid and wide adoption from users around the...

    Read Article
  • Finding Data Exfiltration During the Cloud App Discovery Process

    Finding Data Exfiltration During the Cloud App Discovery Process

    Today I started a Netskope Cloud Risk Assessment for one of my customers, and guess what I found? Data exfiltration activity from compromised network attached storage (NAS) devices communicating...

    Read Article
  • Zepto variant of Locky ransomware delivered via popular Cloud Storage apps

    Zepto variant of Locky ransomware delivered via popular Cloud Storage apps

    Netskope Threat Research Labs has detected a new strain of the Zepto ransomware shared among cloud users. As has been the trend in recent months, this strain of Zepto arrives at its destination...

    Read Article
  • Breaking the Ransomware Kill Chain in the Cloud

    Breaking the Ransomware Kill Chain in the Cloud

    Over the past few months, we’ve published multiple posts here about ransomware – Surprise, Petya/Mischa, Cerber, and cuteRansomware to name a few. One of the common themes that we’ve seen across...

    Read Article
  • CloudSquirrel Malware Squirrels Away Sensitive User Data Using Popular Cloud Apps

    CloudSquirrel Malware Squirrels Away Sensitive User Data Using Popular Cloud Apps

    Netskope has discovered a malware campaign that takes advantage of multiple cloud apps throughout the kill chain. The campaign, which we have dubbed “CloudSquirrel,” has been in operation since...

    Read Article
  • Avoiding Proxy Creep with an Instance-Aware CASB

    Avoiding Proxy Creep with an Instance-Aware CASB

    One of Netskope’s more popular taglines is “Allow is the new Block.” Many times, customers and prospects will ask me what that means and how it impacts them. To answer, I walk them through their...

    Read Article
  • cuteRansomware Uses Google Docs to Fly Under Radar

    cuteRansomware Uses Google Docs to Fly Under Radar

    Ransomware is gaining in popularity. It is a real threat as it seeks to find and encrypt users’ important files and then hold those files for ransom. Netskope has detected and reported on an...

    Read Article
  • Cloud DLP in Healthcare: Five Must-Do Strategies

    Cloud DLP in Healthcare: Five Must-Do Strategies

    The healthcare market is ripe for cloud access security broker (CASB) and cloud data loss prevention (cloud DLP) solutions. Between a major transition to online medical records, a transient and...

    Read Article
  • Five Ways to Tell if Your CASB is in it for the Long Haul

    Five Ways to Tell if Your CASB is in it for the Long Haul

    Everybody seems to want in on the cloud access security broker (CASB) market! In the past year, Cisco acquired CloudLock, Microsoft acquired Adallom, and Blue Coat acquired Elastica and Perspecsys...

    Read Article
  • Anatomy of a Ransomware Attack: Cerber Uses Steganography to “Hide in Plain Sight”

    Anatomy of a Ransomware Attack: Cerber Uses Steganography to “Hide in Plain Sight”

    Ransomware is a hot topic and it’s about to become hotter. Why? Because now it’s targeting our cloud services. Nearly one out of five malware detections in the past month in the Netskope Active...

    Read Article
  • I’ve Discovered 900 Cloud Apps. Now What?!?!

    I’ve Discovered 900 Cloud Apps. Now What?!?!

    In working with many of our customers to implement the Netskope cloud access security broker (CASB), we find that the moments after the customer discovers how many cloud apps are in use in their...

    Read Article
  • Cloud App Acceptance Stage 4: Acceptance

    Cloud App Acceptance Stage 4: Acceptance

    George Orwell frames the concept of acceptance very succinctly with “Happiness can exist only in acceptance”. And that’s what I’m hoping this series of blog posts will help you achieve. I hope...

    Read Article
  • CIS 2016 Reflections

    CIS 2016 Reflections

    I had the opportunity to participate and mingle with the Identity and Access Management (IAM) community at the Cloud Identity Summit held a couple weeks ago in New Orleans (#CISNOLA) and wanted to...

    Read Article
  • CASBs Top Gartner’s List of Key Information Security Technologies in 2016

    CASBs Top Gartner’s List of Key Information Security Technologies in 2016

    Gartner issued a press release identifying the top 10 technologies for information security in 2016, with cloud access security brokers at the top of that list.

    Read Article
  • Netskope brings cloud context to Cisco Platform Exchange Grid

    Netskope brings cloud context to Cisco Platform Exchange Grid

    When it comes to cloud security, sharing information across tools and infrastructure is critical to cover key threat vectors and use cases. The Netskope Active Platform was designed from the...

    Read Article
  • Standing Up an Effective Cloud Security Program

    Standing Up an Effective Cloud Security Program

    When we started Netskope more than three years ago, I truly believed that we were addressing an important problem for enterprise security teams – how to gain back the visibility and control that...

    Read Article
  • Cloud Malware Found in Enterprises with Sanctioned Apps Nearly Triples

    Cloud Malware Found in Enterprises with Sanctioned Apps Nearly Triples

    We recently released our global Cloud Report as well as our Europe, Middle East and Africa version, highlighting cloud activity from January through March of 2016. Each quarter we report on...

    Read Article
  • June 2016 Cloud Report: Majority of Cloud Apps Not Ready for GDPR and Malware on the Rise in Sanctioned Cloud Apps

    June 2016 Cloud Report: Majority of Cloud Apps Not Ready for GDPR and Malware on the Rise in Sanctioned Cloud Apps

    Today we released our quarterly Cloud Report for June 2016 – global as well as Europe, Middle East and Africa versions. Besides our regular stats of cloud app usage, we had three primary sections:...

    Read Article
  • loading
    Loading More...