Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Looking Back at the Last Decade of Technology

Here at Netskope we are celebrating our 10th anniversary this month, but while our story over that decade is very cool, any blog about it will be of limited interest outside of our own employee base. I wanted to add a different lens to our internal observations and so I started to refresh my memory with research into exactly what went on over those years while we were beavering away to build the best SASE platform in the world.

Key Takeaways from the Just-Published Gartner Market Guide for Single-Vendor SASE

Secure access service edge (SASE), as an architecture, is only three years old, but rapid adoption by organizations is making SASE one of the fastest-growing technology market categories in history. Functionally, SASE will change—and is already changing—how teams make security and networking technology purchases.

10 Years of Netskope, 10 Years a CISO

2012 was an interesting year. In the UK it was all Olympic Games and Golden Jubilees, while in the US, Barack Obama was reelected for a second term. The Mayan calendar came to an abrupt end—but the world did not—and we saw the final flight of NASA’s Space Shuttle. Amid all this, someone found the time to start up a new tech venture—a company anticipating massive transformation in networks, cloud, and cyber security. That company was Netskope.

The Essential Steps of a Successful Zero Trust 'Journey' for Federal Agencies

By Nate Smolenski In May, the National Institute of Standards and Technology (NIST) released the white paper, “Planning for a Zero Trust Architecture,” which illustrates how agencies can make this transition by leveraging the seven steps of the NIST Risk Management Framework (RMF): Prepare, categorize, select, implement, assess, authorize, and monitor.

The Key Elements of Successful Security Transformation

Digital transformation has highlighted a shift in value from the traditional, on-prem, legacy IT environment and physical distribution channels to the value being created by the scale of (customer) data and the ability to deliver a personalized service to customers in a trusted, secure, and private way.

Spending Decisions in an Economic Squeeze

Inflation, stagnation… even stagflation and recession… these are the words that look like they will define global economies in 2022 and into 2023. There’s barely a country that is being spared the crunch, and we are already seeing heated debate among global politicians as to the appropriate fiscal response. Do we spend or save our way out of this?

RedLine Stealer Campaign Abusing Discord via PDF Links

RedLine is an infostealer malware discovered in 2020. Often sold in underground forums, it is capable of stealing data such as credit card numbers, passwords, VPN and FTP credentials, gaming accounts, and even data from crypto wallets. In May 2022, Netskope Threat Labs analyzed a RedLine stealer campaign that was using YouTube videos to spread, luring victims into downloading a fake bot to automatically buy Binance NFT Mystery Boxes.

Addressing Device Security Risks in the Hybrid Enterprise with Netskope IoT Security

Internet-connected devices (also known as “the internet of things”) are a key business enabler for modern enterprises focused on transforming their businesses and gaining competitive advantage through automation and intelligent decision-making. According to IDC, there will be over 55.7 billion connected IoT devices (or “things”) by 2025, generating almost 80B zettabytes (ZB) of data.

Strategies for Gathering and Contextualizing Cyber Threat Intelligence

In my previous blog, I covered the many different types of cyber threat intelligence and why gathering CTI is beneficial to security teams. In this post, I will dig into the cyber threat intelligence lifecycle framework and a model to help correlate and contextualize your findings.

The EU Cyber Resilience Act - Thinking Out Implementation

From TVs to watches, fridges, lightbulbs, or coffee machines, it seems everything needs to be connected now to be marketable. The Internet of Things (IoT) environment is growing in homes and workplaces, but it has established itself way ahead of regulation. IoT devices do not currently have to comply with any specific cybersecurity standards and malicious actors are already making use of these endpoints.