Made With Uberflip Content Marketing

Netskope Blog

The official Netskope blog.

  • Compromised Accounts and the Netskope Active Platform

    Compromised Accounts and the Netskope Active Platform

    Today we released our Cloud Report for this quarter – global  and...

    Read Article
  • Movie Line Monday Rewind: Mobile + Cloud = BFF's

    Movie Line Monday Rewind: Mobile + Cloud = BFF's

    “How can a mobile phone have an agenda and kill people?” - Aldous Snow...

    Read Article
  • Cloud App Ecosystems —  Why they should matter to you

    Find Out Why
  • Information Security Policy for the Cloud: Do's and Dont's - Netskope

    Information Security Policy for the Cloud: Do's and Dont's - Netskope

    Don't be a target for data hacks. Here's some quick do's and don'ts for getting started on building a cloud information security policy for your company. Read more!

    Read Article
  • Movie Line Monday Rewind: Simpson's Paradox in Cloud App Usage

    Movie Line Monday Rewind: Simpson's Paradox in Cloud App Usage

    In this Movie Line Monday episode, Netskope data scientist, Ram Keralapura, explains how he noticed Simpson's Paradox at play in the data we collected when comparing Cloud Storage vs HR cloud apps.

    Read Article
  • Cloud App Ecosystems: What You Need to Know

    Cloud App Ecosystems: What You Need to Know

    Here are three things we recommend for getting your arms around cloud app ecosystems.

    Read Article
  • Movie Line Monday Rewind: A place for your stuff

    Movie Line Monday Rewind: A place for your stuff

    In this episode of Movie Line Monday, Sr. Director of Product Marketing Bob Gilbert reaches back into the early 80s to reference the great George Carlin’s 1981 stand up routine about finding a place f

    Read Article
  • Another FREAK vulnerability in SSL/TLS Protocol

    Another FREAK vulnerability in SSL/TLS Protocol

    Another FREAK vulnerability in SSL/TLS Protocol

    Read Article
  • ×

    Want the latest news on cloud security?

    Get it here.

    First Name
    Last Name
    Company
    Thank you!
    Error - something went wrong!
  • Movie Line Monday Rewind: Open Source is Open, But Not Free

    Movie Line Monday Rewind: Open Source is Open, But Not Free

    Netskope Chief Network Architect, Steve Malmskog, who gets into the pros/cons of using open source software.

    Read Article
  • Movie Line Monday: Scalability

    Movie Line Monday: Scalability

    Netskope VP of Engineering Abhay Kulkarni shares how scalability is a feature of any cloud service and how horizontal scaling is an important part of scalability.

    Read Article
  • The Marketing Stack: The End of "Suite"

    The Marketing Stack: The End of "Suite"

    I would argue that there is no "suite" anymore, just ecosystems of intertwined apps.

    Read Article
  • Get our blog RSS feed.

    Get the RSS
  • Movie Line Monday: Quarantine

    Movie Line Monday: Quarantine

    In this episode of Movie Line Monday, Netskope VP of Product Management Rajneesh Chopra shares how Netskope's quarantine capability provides an automated quarantine process delivered as a fluid workfl

    Read Article
  • Cloud Security and the User Experience Trade-off

    Cloud Security and the User Experience Trade-off

    In the past, companies needed to make the trade-off between cloud security & the end user experience. See how Netskope lets IT have their cake & eat it too!

    Read Article
  • Movie Line Monday Rewind: Anomaly Detection for Cloud Security - Part 2

    Movie Line Monday Rewind: Anomaly Detection for Cloud Security - Part 2

    In this part 2 of a 2-episode Movie Line Monday series, Netskope Chief Scientist Krishna Narayanaswamy shares how to do cloud security anomaly detection to stay proactive against unknown threats.

    Read Article
  • Big Blue Has Gone Anti-Cupid

    Big Blue Has Gone Anti-Cupid

    I've seen my share of Valentine's Days and while I'm...

    Read Article
  • What's in your cloud?  Find sensitive data in minutes.

    What's in your cloud? Find sensitive data in minutes.

    What's in your cloud? Find sensitive data in minutes.

    Read Article
  • Movie Line Monday Rewind: Anomaly Detection for Cloud Security

    Movie Line Monday Rewind: Anomaly Detection for Cloud Security

    Movie Line Monday Rewind: Anomaly Detection for Cloud Security.

    Read Article
  • Cloud: The hacker’s new weapon

    Cloud: The hacker’s new weapon

    The Anthem Health breach has a new wrinkle, and it’s big. It’s called the cloud. We believe that in Anthem’s case, a Cloud Storage app served as the exfiltration point.

    Read Article
  • The Power of “If:” 7 Cloud App Policies That Will Meaningfully Reduce Your Risk

    The Power of “If:” 7 Cloud App Policies That Will Meaningfully Reduce Your Risk

    Here are seven useful policies that our customers have set that have had a meaningful impact on cloud risk. The one thing these policies have in common? They each have an “if.”

    Read Article
  • Cloud Security and Privacy Don’t Need to Be at Odds

    Cloud Security and Privacy Don’t Need to Be at Odds

    Privacy is a concern when enterprises expand their usage of the cloud. Cloud Access Security Brokers address cloud activity governance and fill in the gaps in security controls across cloud services.

    Read Article
  • Data Loss Prevention for Higher Education

    Data Loss Prevention for Higher Education

    Hardly a day goes by without a media report about a data breach that exposes...

    Read Article
  • loading
    Loading More...