Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Cybersecurity Awareness Month: Adding Threat to Vulnerability Management

Vulnerability management can be more than just running scans and sorting by Common Vulnerability Scoring System scores! Take your program to the next level by adding a threat-based approach to vulnerability management by combining the hacker mindset with cyber threat intelligence. With so many vulnerabilities published daily, having a team knowledgeable with the latest threats can help IT teams quickly identify assets that require expedited remediation.

Making Sense of Zero Trust Through the Lens of Networking and Infrastructure

“Zero trust” still confuses people—and for good reason. While the term conveys a certain absolute authority (“zero,” “nope,” “nothing”), contemporary approaches offer much more nuanced capabilities. And while zero trust today is typically associated with security initiatives, the concepts have their origin in the definition of network perimeters, who is granted access, and how that access is provided.

Cybersecurity Awareness Month: Answering 3 Big Questions About Secure Passwords

Passwords have been employed by many since the days of the Roman Empire, and they quickly became omnipresent as we approached the digital age. However, rapid changes in the security landscape have forced us to evolve what our passwords look like and how they are used. At times, this has led to conflicting advice and confusion on what proper password management looks like. By clarifying how to best create and use passwords, we can make it easier for people to stay safe online.

Looking Back at the Last Decade of Technology

Here at Netskope we are celebrating our 10th anniversary this month, but while our story over that decade is very cool, any blog about it will be of limited interest outside of our own employee base. I wanted to add a different lens to our internal observations and so I started to refresh my memory with research into exactly what went on over those years while we were beavering away to build the best SASE platform in the world.

Key Takeaways from the Just-Published Gartner Market Guide for Single-Vendor SASE

Secure access service edge (SASE), as an architecture, is only three years old, but rapid adoption by organizations is making SASE one of the fastest-growing technology market categories in history. Functionally, SASE will change—and is already changing—how teams make security and networking technology purchases.

10 Years of Netskope, 10 Years a CISO

2012 was an interesting year. In the UK it was all Olympic Games and Golden Jubilees, while in the US, Barack Obama was reelected for a second term. The Mayan calendar came to an abrupt end—but the world did not—and we saw the final flight of NASA’s Space Shuttle. Amid all this, someone found the time to start up a new tech venture—a company anticipating massive transformation in networks, cloud, and cyber security. That company was Netskope.

The Essential Steps of a Successful Zero Trust 'Journey' for Federal Agencies

By Nate Smolenski In May, the National Institute of Standards and Technology (NIST) released the white paper, “Planning for a Zero Trust Architecture,” which illustrates how agencies can make this transition by leveraging the seven steps of the NIST Risk Management Framework (RMF): Prepare, categorize, select, implement, assess, authorize, and monitor.

The Key Elements of Successful Security Transformation

Digital transformation has highlighted a shift in value from the traditional, on-prem, legacy IT environment and physical distribution channels to the value being created by the scale of (customer) data and the ability to deliver a personalized service to customers in a trusted, secure, and private way.

Spending Decisions in an Economic Squeeze

Inflation, stagnation… even stagflation and recession… these are the words that look like they will define global economies in 2022 and into 2023. There’s barely a country that is being spared the crunch, and we are already seeing heated debate among global politicians as to the appropriate fiscal response. Do we spend or save our way out of this?

RedLine Stealer Campaign Abusing Discord via PDF Links

RedLine is an infostealer malware discovered in 2020. Often sold in underground forums, it is capable of stealing data such as credit card numbers, passwords, VPN and FTP credentials, gaming accounts, and even data from crypto wallets. In May 2022, Netskope Threat Labs analyzed a RedLine stealer campaign that was using YouTube videos to spread, luring victims into downloading a fake bot to automatically buy Binance NFT Mystery Boxes.