Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • The Most Critical CASB Use Cases in the Market Today: Enforce an Activity- or Data-level Policy Across a Category of Services

    The Most Critical CASB Use Cases in the Market Today: Enforce an Activity- or Data-level Policy Across a Category of Services

    As cloud services become more prevalent in enterprises, IT is getting smarter about what to do with them. Whereas a couple of years ago, IT might have opted to “sanction one cloud service and...

    Read Article
  • ×

    Get the latest posts to your inbox.

    Subscribe to the Cloud Security Blog

    Thank you!
    Error - something went wrong!
  • January 2017 Cloud Report: Half of all users of a sanctioned cloud storage service have a personal instance of the same service

    January 2017 Cloud Report: Half of all users of a sanctioned cloud storage service have a personal instance of the same service

    Today we released the January 2017 Netskope Cloud Report – global as well as Europe, Middle East and Africa versions. This quarter we focus on differentiating between corporate and personal...

    Read Article
  • Block or remediate malware in sanctioned & unsanctioned cloud services, even when users access from mobile or desktop apps or sync clients

    Block or remediate malware in sanctioned & unsanctioned cloud services, even when users access from mobile or desktop apps or sync clients

    As cloud services become more popular and broadly used, they are becoming a big target for hackers. This is especially disconcerting, since most organizations don’t know fully what services are in...

    Read Article
  • The Most Critical CASB Use Cases in the Market Today: Enforce Layered Policies That Include a “Base” and “Exception” Policy

    The Most Critical CASB Use Cases in the Market Today: Enforce Layered Policies That Include a “Base” and “Exception” Policy

    As enterprise IT gets smarter and more nuanced about cloud security, it now expects to exert controls over cloud services according to a multitude of contextual factors. IT and security...

    Read Article
  • Gartner Report: Market Guide for Cloud Access Security Brokers

    Get Your Copy
  • The Most Critical CASB Use Cases in the Market Today: Monitor or control advanced and cross-service activities

    The Most Critical CASB Use Cases in the Market Today: Monitor or control advanced and cross-service activities

    “Sanction one cloud service and block the rest” has finally been relegated to the junk heap of cloud security strategies as enterprises move past log-based discovery for their end-all cloud access...

    Read Article
  • What’s on the horizon for cloud security in 2017?

    What’s on the horizon for cloud security in 2017?

    The average enterprise has nearly 1000 cloud services in use by employees — a number that continues to rise as companies lean into services that help them work and collaborate faster. But what’s...

    Read Article
  • New Variants of Locky Ransomware Found

    New Variants of Locky Ransomware Found

    Locky ransomware is in the news again with variants using different extensions for encrypted files. A couple of months ago, we blogged about the Zepto variant of Locky ransomware which used the...

    Read Article
  • How Netskope Solved the Gordian Knot of CASB Use Cases

    How Netskope Solved the Gordian Knot of CASB Use Cases

    As the story goes, Gordias was declared king after an eagle landed on the ox cart upon which he had ridden into town — since this had been prophesied. His son Midas, so proud of his father,...

    Read Article
  • 10 essential DLP features you should demand from your CASB

    10 essential DLP features you should demand from your CASB

    According to Gartner, cloud access security brokers (CASBs) deliver capabilities around four pillars of functionality; visibility, compliance, data security, and threat protection. Within the data...

    Read Article
  • Three Requirements for Effective Cloud Incident Management

    Three Requirements for Effective Cloud Incident Management

    Three Requirements for Effective Cloud Incident Management Working with some of our largest customers here at Netskope, I’ve been involved in several implementations of cloud DLP. More than 80...

    Read Article
  • The Most Critical CASB Use Cases in the Market Today: Monitor privileged accounts and prevent unauthorized activity in IaaS instances

    The Most Critical CASB Use Cases in the Market Today: Monitor privileged accounts and prevent unauthorized activity in IaaS instances

    Enterprises’ cloud security use cases are maturing, and what they expect of their cloud access security broker (CASB) is going way beyond discovery of SaaS applications.   Netskope customers have...

    Read Article
  • The most critical CASB use cases: Monitor or control users’ activities within collaboration and social media services without blocking them

    The most critical CASB use cases: Monitor or control users’ activities within collaboration and social media services without blocking them

    Enterprises are adopting the cloud in a big way, and their cloud access security broker (CASB) use cases are maturing. They are moving from outdated concepts like log-based discovery to enforcing...

    Read Article
  • Extending Our Leading Data Protection with Secure, Resilient Gateway-delivered Structured Data Encryption

    Extending Our Leading Data Protection with Secure, Resilient Gateway-delivered Structured Data Encryption

    We are pleased to announce that we are extending our industry-leading cloud data protection in the Netskope Active Platform by enhancing our structured data encryption delivered native in the...

    Read Article
  • Monitor or control users’ activities even when they are accessing cloud services from a mobile app or desktop native app

    Monitor or control users’ activities even when they are accessing cloud services from a mobile app or desktop native app

    Enterprises’ cloud security use cases are maturing, and they are seeking a cloud access security broker (CASB) to help them move from log-based discovery to enforcing more sophisticated policy or...

    Read Article
  • Manually Deobfuscating Strings Obfuscated in Malicious JavaScript Code

    Manually Deobfuscating Strings Obfuscated in Malicious JavaScript Code

    Recently we have seen ransomware rapidly spreading as email attachments in zip compressed format. As we blogged earlier here and here, these attachments contain one or more JavaScript (.js), or...

    Read Article
  • Detect Anomalies Such as Excessive Downloads, Uploads, or Sharing Within Both Sanctioned and Unsanctioned Cloud Services

    Detect Anomalies Such as Excessive Downloads, Uploads, or Sharing Within Both Sanctioned and Unsanctioned Cloud Services

    As enterprises adopt cloud services and seek out a cloud access security broker (CASB), their use cases are maturing. They are moving beyond log-based discovery, and even beyond just their...

    Read Article
  • CloudFanta Malware Campaign Technical Analysis

    CloudFanta Malware Campaign Technical Analysis

    We recently published an overview blog about the CloudFanta malware campaign that uses the Sugarsync cloud storage app to deliver malware capable of stealing user credentials and monitoring online...

    Read Article
  • Box Security Classification with Netskope

    Box Security Classification with Netskope

    Enterprises around the world and specifically within Netskope’s own customer base are increasingly using content management services as their system of record for content. And Box is the modern...

    Read Article
  • CloudFanta Pops with the Cloud using SugarSync

    CloudFanta Pops with the Cloud using SugarSync

    Netskope Threat Research Labs has discovered a new malware campaign, which we suspect stole more than 26,000 email credentials and also monitors online banking activities. The malware, which we...

    Read Article
  • Nitol Botnet makes a resurgence with evasive sandbox analysis technique

    Nitol Botnet makes a resurgence with evasive sandbox analysis technique

    Introduction Netskope Threat Research Labs recently observed a strain of macro-based malwares that use fairly smart techniques to bypass malware sandbox analysis. The macro code is obfuscated and...

    Read Article
  • loading
    Loading More...