Slideshare - All Slideshows

This stream includes Netskope's latest Slideshares.

  • DEF CON 27 - Exploiting AWS Loopholes

    DEF CON 27 - Exploiting AWS Loopholes

    DEF CON 27 talk

    View Now
  • Check out the latest Cloud Security Report

    Get Report
  • DEF CON 27 - The Future of Command and Control

    DEF CON 27 - The Future of Command and Control

    DEF CON 27 talk

    View Now
  • DEF CON 27 - Phishing in the Cloud Era

    DEF CON 27 - Phishing in the Cloud Era

    DEF CON 27 talk

    View Now
  • Defcon 27 - Exploiting IAM in GCP

    Defcon 27 - Exploiting IAM in GCP

    Defcon 27 talk

    View Now
  • The Definitive CASB Business Case Kit - Presentation

    The Definitive CASB Business Case Kit - Presentation

    View Now
  • 5 Highest-Impact CASB Use Cases - Office 365

    5 Highest-Impact CASB Use Cases - Office 365

    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security lea

    View Now
  • 5 Highest-Impact CASB Use Cases - Office 365

    5 Highest-Impact CASB Use Cases - Office 365

    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security lea

    View Now
  • 5 Highest-Impact CASB Use Cases

    5 Highest-Impact CASB Use Cases

    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security lea

    View Now
  • Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud

    Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud

    The explosion of useful cloud applications has enabled new levels of productivity, resulting in strategic advantages for some healthcare providers. But cloud app usage is not without risk. Craig Gu

    View Now
  • Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud

    Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud

    The explosion of useful cloud applications has enabled new levels of productivity, resulting in strategic advantages for some healthcare providers. But cloud app usage is not without risk. Craig Gu

    View Now
  • The Malware Attack "Fan-out" Effect in the Cloud

    The Malware Attack "Fan-out" Effect in the Cloud

    Krishna Narayanaswamy, Chief Scientist at Netskope, presented “Advanced Malware and Botnets: Understanding the New Concept of ‘Attack Fan-out’ in the Cloud” at the CSA Summit in San Francisco at the R

    View Now
  • Quantifying Cloud Risk for Your Corporate Leadership

    Quantifying Cloud Risk for Your Corporate Leadership

    The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using

    View Now
  • Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.

    Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.

    Let’s face it: When it comes to data loss prevention, we’re not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most o

    View Now
  • The Anatomy of a Cloud Data Breach

    The Anatomy of a Cloud Data Breach

    With more than 700 cloud apps being used by a typical enterprise, what is the risk associated with all this cloud usage? There is a catch-22 between using the cloud and being safe. The question is sho

    View Now
  • Autumn 2015 EMEA Netskope Cloud Report

    Autumn 2015 EMEA Netskope Cloud Report

    In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.

    View Now
  • Fall 2015 Worldwide Netskope Cloud Report

    Fall 2015 Worldwide Netskope Cloud Report

    In this Netskope Cloud Report infographic, we've compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the Netskope Active Platform.

    View Now
  • Cloud Security for Dummies — The Identity Edition Webinar Slides

    Cloud Security for Dummies — The Identity Edition Webinar Slides

    Join "Cloud Security for Dummies" authors Ravi Ithal and Krishna Narayanaswamy, along with Patrick Harding, CTO from Ping Identity for this special “Identity Edition” of the Cloud Security for Dum

    View Now
  • Reference Architecture for Data Loss Prevention in the Cloud

    Reference Architecture for Data Loss Prevention in the Cloud

    Do you measure up? A new reference architecture for data loss prevention (DLP) in the the cloud. Six key architectural tenets.

    View Now
  • Reference Architecture for Data Loss Prevention in the Cloud

    Reference Architecture for Data Loss Prevention in the Cloud

    Do you measure up? A new reference architecture for data loss prevention (DLP) in the the cloud. Six key architectural tenets.

    View Now
  • Office 365 Webinar Slides: Security & Governance Strategies

    Office 365 Webinar Slides: Security & Governance Strategies

    Enterprise adoption of Office 365 is tricky. Join our webinar for a look at safe enablement best practices for Office 365 and the role cloud security brokers play!

    View Now
  • loading
    Loading More...