Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • The Most Critical CASB Use Cases in the Market Today: Detect and Alert on User Login Anomalies

    The Most Critical CASB Use Cases in the Market Today: Detect and Alert on User Login Anomalies

    As an increasing number of threats find their way to cloud services, IT and security professionals are turning to their cloud access security broker (CASB) to help them protect their most valuable...

    Read Article
  • Netskope at RSA Conference 2017: Wednesday

    Netskope at RSA Conference 2017: Wednesday

    It’s huuuuuuump day, even if you’re not a camel! What’s going on in the Netskope booth today at S839 in Moscone South? Here’s the rundown: 10am. Netskope demo. Six highest-impact use cases...

    Read Article
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Thank you!
    Error - something went wrong!
  • Netskope at RSA Conference 2017: Tuesday

    Netskope at RSA Conference 2017: Tuesday

    It’s Tuesday, Red’s Tamales Day (if you’re from the Bay Area, you’ll recognize this reference)! What’s going on in the Netskope booth today at S839 in Moscone South? Here’s the rundown: 10am....

    Read Article
  • Netskope at RSA Conference 2017: Monday

    Netskope at RSA Conference 2017: Monday

    Happy Monday! As you get ready to participate in the largest security conference in the world, don’t forget to attend the cloud-focused Cloud Security Alliance Summit 2017: Securing the Converged...

    Read Article
  • Gartner Report: Market Guide for Cloud Access Security Brokers

    Get Your Copy
  • Five Cloud Security “Must-Dos” at RSA Conference 2017

    Five Cloud Security “Must-Dos” at RSA Conference 2017

    Cloud security professionals are in for a treat at RSA Conference 2017. There is an enhanced and increased focus on cloud this year, from sessions to the Cloud Security Alliance’s cloud-focused...

    Read Article
  • Cloud CRM Services as a Malware Attack Vector

    Cloud CRM Services as a Malware Attack Vector

    Cloud Customer Relationship Management (CRM) services are broadly used, house organization’s most critical customer data, and deliver those data to corporate users via the web. Netskope Threat...

    Read Article
  • Decoys, RATs, and the Cloud: The growing trend

    Decoys, RATs, and the Cloud: The growing trend

    Netskope Threat Research Labs recently posted an article, detailing the CloudPhishing Fan-out resulting from Decoy PDF documents. We are observing a growing trend in the use of such PDF decoys...

    Read Article
  • The Most Critical CASB Use Cases in the Market Today: Enforce Conditional, Activity-level Policies

    The Most Critical CASB Use Cases in the Market Today: Enforce Conditional, Activity-level Policies

    As we wrap up our quarter and fiscal year this week at Netskope, I’ve been reflecting on our business metrics and how they have changed over the past year. Ninety percent of our customers chose to...

    Read Article
  • Netskope integrates with Slack to safely enable enterprise collaboration

    Netskope integrates with Slack to safely enable enterprise collaboration

    In a remarkably short span, Slack has become one of the most popular cloud services used across businesses. Between its early focus on winning over developers who quickly became incredibly...

    Read Article
  • Virlock’s resurgence poses bigger threat to file syncing over the cloud

    Virlock’s resurgence poses bigger threat to file syncing over the cloud

    A new variant of the Virlock family of wormed ransomware has been detected actively propagating in the wild. Virlock not only encrypts every file in a file system, but infects them simultaneously....

    Read Article
  • Ransomware + Click Fraud: A New Blended Attack

    Ransomware + Click Fraud: A New Blended Attack

    Netskope Threat Research Labs has detected a malicious campaign that uses a ransomware blended attack. A ransomware blended threat package includes malware such as credential stealers, backdoors,...

    Read Article
  • The Most Critical CASB Use Cases in the Market Today: Prevent Data Infiltration Involving New Employees

    The Most Critical CASB Use Cases in the Market Today: Prevent Data Infiltration Involving New Employees

    We’ve all heard about data exfiltration, or the unsanctioned removal of data, especially sensitive data, from an enterprise. Most organizations that are considering investing in a cloud access...

    Read Article
  • Decoys, Phishing, and the Cloud: The Latest Fan-out Effect

    Decoys, Phishing, and the Cloud: The Latest Fan-out Effect

    Netskope Threat Research Labs has observed phishing attacks using decoy PDF files, URL redirection, and Cloud Storage services to infect users and propagate malware. Because many organizations...

    Read Article
  • The Most Critical CASB Use Cases in the Market Today: Enforce an Activity- or Data-level Policy Across a Category of Services

    The Most Critical CASB Use Cases in the Market Today: Enforce an Activity- or Data-level Policy Across a Category of Services

    As cloud services become more prevalent in enterprises, IT is getting smarter about what to do with them. Whereas a couple of years ago, IT might have opted to “sanction one cloud service and...

    Read Article
  • January 2017 Cloud Report: Half of all users of a sanctioned cloud storage service have a personal instance of the same service

    January 2017 Cloud Report: Half of all users of a sanctioned cloud storage service have a personal instance of the same service

    Today we released the January 2017 Netskope Cloud Report – global as well as Europe, Middle East and Africa versions. This quarter we focus on differentiating between corporate and personal...

    Read Article
  • Block or remediate malware in sanctioned & unsanctioned cloud services, even when users access from mobile or desktop apps or sync clients

    Block or remediate malware in sanctioned & unsanctioned cloud services, even when users access from mobile or desktop apps or sync clients

    As cloud services become more popular and broadly used, they are becoming a big target for hackers. This is especially disconcerting, since most organizations don’t know fully what services are in...

    Read Article
  • The Most Critical CASB Use Cases in the Market Today: Enforce Layered Policies That Include a “Base” and “Exception” Policy

    The Most Critical CASB Use Cases in the Market Today: Enforce Layered Policies That Include a “Base” and “Exception” Policy

    As enterprise IT gets smarter and more nuanced about cloud security, it now expects to exert controls over cloud services according to a multitude of contextual factors. IT and security...

    Read Article
  • The Most Critical CASB Use Cases in the Market Today: Monitor or control advanced and cross-service activities

    The Most Critical CASB Use Cases in the Market Today: Monitor or control advanced and cross-service activities

    “Sanction one cloud service and block the rest” has finally been relegated to the junk heap of cloud security strategies as enterprises move past log-based discovery for their end-all cloud access...

    Read Article
  • What’s on the horizon for cloud security in 2017?

    What’s on the horizon for cloud security in 2017?

    The average enterprise has nearly 1000 cloud services in use by employees — a number that continues to rise as companies lean into services that help them work and collaborate faster. But what’s...

    Read Article
  • New Variants of Locky Ransomware Found

    New Variants of Locky Ransomware Found

    Locky ransomware is in the news again with variants using different extensions for encrypted files. A couple of months ago, we blogged about the Zepto variant of Locky ransomware which used the...

    Read Article
  • loading
    Loading More...