Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Trainspotting: Lessons in Network Security and Critical National Infrastructure

Today, in the heart of London, I caught sight of a screen on platform four at Vauxhall train station. On it was displayed a busy illustration of the marvels of modern transportation: trains moving seamlessly across multiple lines; their positions, destinations, and tracks all displaying tightly orchestrated precision in real-time. It was a compelling depiction of the complexity of a public rail system on a small island–a tightly woven network where data integrity is paramount.

How a Private Cloud Approach to SASE Helped Reduce Disruption From a Severed Sub-sea Cable

It feels like sub-sea cable disruptions are becoming ever more common, with recent reports of major outages caused by severed cables in the Mediterranean, the Red Sea, the North Sea, and—most recently—off the coast of Africa.

A Swiss Army Knife for ISO 27001:2022 Compliance

ISO standards may not always jump out as the most exciting of topics for dinner party conversation, but their growing importance in business cannot be denied. And this year it is well worth us talking about ISO 27001:2022 specifically (though perhaps not over dinner). It is expected that as many as 90,000* organisations might renew their certification or gain it for the very first time this year. The auditors will be busy!

AI Assistants: A New Challenge for CISOs

Over the past year, AI innovation has swept through the workplace. Across industries and all team functions, we are seeing employees using AI assistants to streamline various tasks, including taking minutes, writing emails, developing code, crafting marketing strategies and even helping with managing company finances.

Positioning as a Leader in SSE Within Industry Report Signals Future Direction

Bellwether industry analyst reports continue to indicate the future direction for security service edge (SSE) solutions. The recently released report, The Forrester Wave™: Security Service Edge Solutions, Q1 2024, includes Netskope as a Leader and ranked it highest for in the Current Offering category. Beyond the short list of leaders, here is Netskope’s take on the report’s findings and key signals that will help you assess the right vendors to fit your strategic outcomes.

Unlock the Power of Next Gen SASE Branch with IoT/OT Device Intelligence Integrated in Unified SASE Gateway

Imagine a future where office coffee machines autonomously order beans, and both comfort and energy efficiency are effortlessly managed through smart lighting and temperature controls, alongside smart factories leveraging robotic arms for optimal production. With the internet of things (IoT) market expected to reach 55.7 billion devices by 2025, as predicted by IDC, this potential future brings thrilling opportunities and serious challenges.

From Delivery To Execution: An Evasive Azorult Campaign Smuggled Through Google Sites

Netskope Threat Labs has observed an evasive Azorult campaign in the wild that employs multiple defense evasion techniques from delivery through execution to fly under the defender’s radar as it steals sensitive data. Azorult is an information stealer first discovered in 2016 that steals sensitive information including user credentials, browser information, and crypto wallet data.

Introducing Bandwidth Control

In the fast-paced realm of digital connectivity, the effective management of internet bandwidth is pivotal for ensuring business continuity through seamless access to business-critical applications. Network administrators often grapple with the constant challenge of prioritizing business critical applications during network contention, a challenge exacerbated by the prevalence of high-bandwidth-consuming non-business web applications.