Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Data Privacy Day 2023 - How Cyber Can Lead the Charge in User Protection

Tomorrow, January 28, marks the annual Global Data Privacy Day, an annual reminder of the importance of safeguarding personal information in our always-connected society. With the boundaries between the online and offline realms becoming increasingly blurred, we find ourselves generating an unprecedented amount of data about ourselves, our loved ones, and our personal lives.

Software risks and technical debt: The role of process in determining good software

Understanding how software is developed and the areas impacted by technical debt can help lawyers and investors assess software risks during an M&A. Insight into how software is developed and what kinds of issues can lurk in a codebase enables businesspeople and lawyers to better understand software risks and how to mitigate them.

Data Protection Day 2023: Misaligned Policy Priorities Complicate Data Protection Compliance

January 28 is recognized as Data Protection Day in Europe, the United States and dozens of other countries including Canada and Israel. It provides a moment to reflect on where data protection regulations stand today and where they are going. At present, seemingly incongruent trends in cybersecurity policy threaten to confuse data protection efforts.

Security Questionnaires Explained: How to Respond to the Most Common Questions

Security questionnaires are a set of questions used to assess the security posture of an organization, usually to determine if one company can trust another and work together. These questions are designed to identify and evaluate potential vulnerabilities, as well as to ensure compliance with industry standards and regulations.

How to Reduce Insider Threat Risks in a Hybrid Office: 10 Best Practices

The Covid-19 pandemic has changed the way we work forever. Although some part of the workforce returned to the office as soon as restrictions loosened, many employees wish to continue working remotely. According to data from Gartner, 60% of knowledge workers are remote, with at least 18% not planning to return to the office anytime soon. A hybrid office is a great option for both types of workers.

5 Tips To Keep in Mind for Data Privacy Day

No matter what industry you’re in, data privacy is an issue that impacts you. And when it comes to being safe online with sensitive data, whether that’s your personal data or sensitive data that is important to your organization, being informed is the first step. With that in mind, ahead of Data Privacy Day on January 28, we asked a handful of Netskopers from our CSO, internal security, and Netskope Threat Labs teams to provide tips around data privacy that they think everyone should know.

Covenant C2 Fills the Void Left by Empire PowerShell

Post-exploitation tools are used by threat actors to move laterally inside a network and escalate their privileges in order to steal data, unleash malware, create backdoors and more. Red teams and ethical hackers also use these tools; indeed, simulating the efforts of adversaries plays a key role in implementing effective controls to secure systems, applications and files.