Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2020

Keeping Your Data Safe in the "Gig Economy"

As workforces continue to evolve and adapt to the COVID-19 pandemic, the door is open for organizations to hire workers from anywhere around the country to offer their skills remotely as needed, often as a freelancer or gig worker. While this outgrowth of the burgeoning gig economy stands to benefit many businesses in need, it’s important that you assess your risk of utilizing gig workers and freelancers.

Emerging Public Cloud Security Challenges in 2020 and Beyond

According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end of this year, up from $USD 227.8 billion just a year ago. Clearly, cloud computing is making its way to cloud nine, (See what I did there?) leveraging the sweet fruits of being in the spotlight for a decade. However, the threats to public cloud security are growing at the same rate.

Here Comes 2021: 5 Safe Bets and 5 Long Shot Predictions

As we learned in 2020, vendors predict, and the universe laughs. But this year we polled our experts at Netskope to get their view of the year to come. Here’s how we see 2021 shaping up for networking and security, in the form of some pretty safe bets, and some harder calls. As more organizations consolidate and move away from appliance-based security technologies, IT and security teams will realize the cost savings and operational efficiencies the move to cloud brings.

Demo: Using Netskope policies to deliver Okta authentication challenges based on risky user behavior

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to challenge users for authentication when they perform risky activities. In this example, the uploading of sensitive data to a cloud application will trigger an authentication challenge before allowing the activity to complete.

Demo: Netskope preventing data exfiltration to personal devices from cloud apps managed by Okta

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to apply data protection policies to unmanaged devices accessing managed cloud applications. These policies are typically configured to prevent the downloading of sensitive data from cloud applications to personal or BYOD devices.

Demo: Using Netskope policies to deliver Okta authenticated access to any cloud application

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to apply strong authentication to any cloud application. This demo shows how Netskope can challenge a user for Okta authentication when they attempt to access an unmanaged cloud application.

Hindsight 2020: Revisiting Netskope's Cybersecurity Predictions for the Year No One Saw Coming

2020, as a year, has been anything but predictable, but we’re proud to say we got even a few things right. Here’s a look back at some pretty big trends, a couple of things that sort of happened, and at least one big miss.

Introducing CloudCasa: Kubernetes Backup and Disaster Recovery

Introducing CloudCasa – A Smart Home for Protecting Your Cloud Data. CloudCasa is a Kubernetes (K8s) native and cloud native Software-as-a-Service (SaaS) solution that supports backup of Kubernetes clusters. CloudCasa offers a free service to backup your metadata and resources data to S3 and orchestrate Container Storage Interface (CSI) snapshots on your Kubernetes clusters.

Announcing Teleport 5.0 - Unified Access Plane and Application Access

Today, we are announcing the availability of Teleport 5.0. This is a major release for the project with numerous improvements and new features, but the hallmark capability of this version is the Unified Access Plane and Application Access for Developers. For those unfamiliar with Teleport, it is an open source project for giving developers secure remote access to everything they need.

Gravitational Rebrands as Teleport

Dear Reader, Today we are officially announcing that Gravitational is becoming Teleport. As part of the transition, we are launching a new website and moving from gravitational.com to https://goteleport.com. But that’s not the most important part. A much more interesting side of the story is why we are doing this and the new product announcements and the direction we are taking.

Outpost24 webinar - Securing DevOps in Cloud Environments

The Covid-19 crisis has wreaked havoc on software development, with businesses being forced to adapt and ensure DevOps can carry on to the same production levels and speed as before. As IT and development infrastructure move to the public cloud at an unprecedented rate, the shared responsibility of cloud can create severe security challenges in terms of visibility, control and compliance.

Outpost24 webinar - Cloud security controls best practice

Watch our recorded webinar to discover the critical cloud security controls when migrating to IaaS and PaaS, plus how to build a rich cloud transformation experience and deliver long term operational benefits. As we strive to have greater controls on cloud risk, how can we spend our time more efficiently to focus on what we don’t own and building a more robust cloud operating model? Cloud Security remains a big challenge and whilst the Cloud Security Alliance (CSA) is celebrating its 11th anniversary in 2020 are we any closer to fully understanding the techniques to ensure complete cloud security coverage.

Outpost24 webinar: Busting the myths of cloud security

How secure is the cloud and top cloud security threats What’s covered by the cloud service providers and what’s not in the shared responsibility model IaaS security in a nutshell and how to enforce cloud compliance The different native security tools offered by AWS, Azure and Google Cloud Platform and their shortfalls Why security is too important to leave it to the cloud service providers How to manage risk across different service providers in multi-cloud scenarios Guidance for managing ongoing risk assessment across your cloud journey

SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces

Regulatory authorities are still trying to catch up with cloud computing let alone the revolution that business digitalization is causing as there is no longer a data center to audit or a firewall log to review.

Container security on IBM Cloud

If you’re running containers and Kubernetes on IBM Cloud, you can now enable the key security workflows of Sysdig Secure as a service within your IBM Cloud deployments. This makes it easier for you to implement security tools and policies to ensure your containers and your Kubernetes environment are protected and running as intended. The new container and Kubernetes security features are integrated into IBM Cloud Monitoring with Sysdig and offered as an additional service plan.

Here Comes TroubleGrabber: Stealing Credentials Through Discord

“TroubleGrabber” is a new credential stealer that is being spread through Discord attachments and uses Discord messages to communicate stolen credentials back to the attacker. While it bears some functional similarity to AnarchyGrabber, it is implemented differently and does not appear to be linked to the same group. TroubleGrabber is written by an individual named “Itroublve” and is currently used by multiple threat actors to target victims on Discord.

Common Cloud Computing Security Issues and How to Mitigate Them

Securing your cloud environment effectively is no easy task. What cloud security issues should you be prepared for? What are the most serious security risks? Which best practices are most effective at keeping your data safe? In this article, we will explore the two primary cloud models and the principal security concerns you will face when using each model.

SASE and the Forces Shaping Digital Transformation Part 2: Organizational Culture & Adversaries and Threats

At the convergence of digital transformation, an industry-wide focus on SASE, and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. This is the second blog in a series of three detailing these forces and how security leaders and practitioners can adapt to them in a digitally transforming, SASE-enabled world. This blog covers the forces of Organizational Culture and Adversaries and Threats.

What is a Cloud Access Security Broker? CASB explained

A common component of modern cybersecurity infrastructure, a cloud access security broker (CASB) is technology that provides monitoring and mitigates risks from employee use of cloud services. CASBs were initially developed to fill a gap in cloud security visibility left behind by traditional firewalls, next-generation firewalls, and early secure web gateways, which struggled to identify instances of the unapproved use of cloud services, otherwise known as shadow IT or rogue IT.

SASE and the Forces Shaping Digital Transformation Part 1: Businesses Strategy and Information Technology Ops

At the convergence of digital transformation, an industry-wide focus on SASE, and the effects of the continuing COVID-19 pandemic, there are key forces that security practitioners need to be aware of and operate within. This is the first blog in a series of three detailing these forces and how security leaders and practitioners can adapt to them in a digitally transforming, SASE-enabled world. This blog covers the forces of Business Strategy and Information Technology Operations.

Building a Security Alliance with Your Cloud Partners

As more infrastructure is moved to the cloud, there are many opportunities to reconsider your security stance and relationships to build ever stronger and more secure IT solutions whilst reducing your security costs. In this post, I’m looking to explore some ways that you can build out your alliances to be better prepared and battle-worthy on the digital security war front.

Cloud security series: What are the most common cloud security challenges?

In the second of our three-part series, we highlight the most common cloud security challenges. When migrating infrastructure and services to the cloud it is vital to establish a clear strategy to avoid new security risks. As moving to the cloud can vastly widen the attack surface, it’s important to check whether current security controls will still be effective when migration is complete.

Turning Data into Proactive Security

With cloud computing growing at a phenomenal rate across the world, shifts in consumer behavior towards digital services are resulting in evolutionary changes for the banking, financial services and insurance industry. Cloud-based banking, for example, is regarded as a catalyst for business transformation and a turning point in financial services. Cyber safety, however, has become a key concern holding back cloud adoption in many organizations.

Say What? Natural Language Processing Improves Cloud Security

This is the third entry in a series of articles focused on AI/ML. Natural language processing (NLP) is a form of artificial intelligence (AI) that gives machines the ability to read, understand, and derive meaning from human languages. NLP powers many applications that we use every day, such as virtual assistants, machine translation, chatbots, and email auto-complete. The technology is still evolving very quickly.

Webinar | Teleport v4.4 | Release Demo |

Join Director of Product Ben Arent and CEO Ev Kontsevoy to learn about Teleport’s newest iteration! Teleport 4.4 enables greater visibility into access and behavior by adding Concurrent Session Control features to limit the number of concurrent sessions. Additionally, it can now restrict session sharing and handle idle sessions automatically, making it possible for the user to meet stronger compliance requirements. Ben and Ev will detail these new features, give a demo to show what they will look like in action, and answer all your burning questions.