Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Evolving the Netskope Risk Exchange Ecosystem: Making User-based Changes

Early last month, Netskope announced a few key security innovations across the Netskope One platform and some of my colleagues kicked off the conversation about Netskope Risk Exchange in a previous blog, Evolving the Netskope Risk Exchange Ecosystem. This blog series will continue to explore a number of different workflows that those comfortable using basic scripting, or enablement tools like Postman, can employ to programmatically update and inform your inline policy actions.

Cybersecurity Awareness Month: AI Safety for Friends and Family

Happy October! The leaves are changing and everyone is starting to get ready for the upcoming holidays, but let’s not forget one of the most important holidays of the year—Cybersecurity Awareness Month! Though our audience is almost entirely cybersecurity experts, we wanted to put something together to help the less technical people in our lives learn more about AI and cybersecurity, because Cybersecurity Month is for everyone.

Understanding NTLMv1, NTLMv2 and NTLMv2 Session Security Settings

NTLM has three versions - NTLMv1, NTLMv2 and NTLMv2 Session Security. NTLMv2 is supposed to offer better security than its previous version, and to some extent it does provides better defense against relay and brute force attacks, but does not completely block them. NTLMv2 Session Security is a session security protocol that can be used in conjunction with NTLMv1 or NTLMv2 to provide additional security.

Top 8 Challenges for CIOs and How to Deal With Them

The role of the сhief information officer (CIO) has transformed over the years, extending beyond traditional technical responsibilities. Currently, CIOs are facing numerous issues, such as widely distributed workforces, economic hurdles, and adopting cutting-edge technologies. In this article, we’ll cover these and other challenges facing CIOs today, and measures you can take to navigate them.

Real-Time Secrets Security for Developers with GitGuardian's Extension for Visual Studio Code

Enhance your secure coding practices with GitGuardian’s Visual Studio Code extension. Detect secrets in real-time by embedding security into developers' workflows, boosting productivity and ensuring compliance.

Building Trust in AI: Structured, Evidence-Backed Summaries for Seamless SOC Shift Transfers

Gal Peretz is Head of AI & Data at Torq. Gal accelerates Torq’s AI & Data initiatives, applying his vast expertise in deep learning and natural language processing to advance AI-powered security automation. He also co-hosts the LangTalks podcast, where he discusses the latest in AI and LLM technologies. Staying ahead of evolving cyber threats means more than just keeping up — it means outsmarting the adversary with intelligent, proactive solutions that supercharge your team.

Protecting Sensitive Data Sharing on Social Networking Sites

As organizations embrace social media for networking, marketing, and recruiting, platforms like Facebook, Instagram, LinkedIn, and X (formerly Twitter) have become integral to business operations. While social networking sites offer numerous benefits for productivity, collaboration, and engagement, they also introduce significant security challenges, particularly concerning the handling and potential exposure of sensitive data.

How to Use Teleport Machine ID and GitHub Actions to Deploy to Kubernetes Without Shared Secrets

We are living in the era of Kubernetes. It is hard to find anyone who has not heard of it and in all likelihood you are using it, too. And if you are using Kubernetes, it is probably also safe to assume that you areusing CI/CD to deploy your applications into it. However, as CI/CD and Kubernetes have grown in popularity, the number of bad actors looking to exploit weaknesses in them has grown too.