Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A Comprehensive Guide to Healthcare Cybersecurity

The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient data.

Achieving PSN Compliance: Why It Matters for Your Organisation

The PSN compliance certificate ensures organisations meet stringent security requirements, paving the way for improved operational integrity. Moreover, compliance can enhance organisational value, guiding strategic decisions and fostering a culture of accountability.

Operation Phantom Circuit: North Korea's Global Data Exfiltration Campaign

In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.

Unmasking Shadow AI: What Is it and How Can You Manage it?

Since the launch of ChatGPT in late 2022, gen AI (generative artificial intelligence) has transformed nearly every facet of our lives, including our professions and workplace environments. Adoption has been driven by employees looking for faster, better ways to perform. For example, applications like ChatGPT, DALL-E, and Jasper are helping employees across industries boost productivity, overcome roadblocks, and brainstorm creative solutions.

Redefining Transparency: Netskope Trust Portal 2.0 and DEM

In the world of cloud services, transparency has often been treated as a box to check rather than a cornerstone of innovation. Trust and status portals, once an innovative approach for offering visibility into service health and availability, now largely feel stagnant and table stakes providing the bare minimum. But is transparency and visibility just a “nice-to-have”? Some might think so. At Netskope, we see it differently.

API Security Is At the Center of OpenAI vs. DeepSeek Allegations

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one in the AI community today. According to multiple reports, OpenAI and Microsoft have been investigating whether DeepSeek improperly used OpenAI’s API to train its own AI models.

Aligning compliance with business goals: A strategic approach

Compliance management has emerged as a cornerstone of sustainable growth and risk mitigation. Companies today face increasing regulatory demands while striving to achieve ambitious business objectives. Strategic compliance management, therefore, is not just about adhering to rules but about seamlessly aligning compliance efforts with business goals.

The State of Azure DevOps Threat Landscape - 2024 In Review

The year 2024 is over, so it’s time to sum up what threats were the most dangerous for DevOps and PMs. Outages, degraded service performance, vulnerabilities, cyberattacks, ransomware – all of those were appearing in media headlines all year round. Thus, for the third year in a row, we’ve decided to analyze incidents related to Git hosting services, like Azure DevOps, GitHub, GitLab, and Atlassian. Our first article in a DevOps threat landscape series is dedicated to Azure DevOps.

MDR Cybersecurity Solutions: Protection from Advanced Threats

Corporations need more advanced systems and approaches in place in order to deal with the increasing complexity of cyberattacks. This need for appropriate measures has given rise to a set of practices alongside the Managed Detection and Response (MDR) cybersecurity framework. With the help of ongoing threat hunt, continuous monitoring, and quick incident reactions, hackers are always a step or two behind a firm that uses MDR services.

Grandfather-Father-Son Backup Explained

Protecting critical business data requires a reliable backup system that works consistently. The grandfather-father-son (GFS) backup rotation offers a structured approach through organized daily, weekly, and monthly backup cycles. The GFS backup scheme creates multiple recovery points, giving businesses flexibility when restoring data after unexpected issues.