Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

How SASE and the Internet Took Over Wide Area Networks (Part 1)

This blog is part of the ongoing “I&O Perspectives” series, which features insights from industry experts about the impact of current threats, networking, and other cybersecurity trends. As I embark on a new role with the Netskope Platform Engineering team, I am eager to explore how our company’s vision shapes the evolution of enterprise networking security.

Transform Your Connectivity with Context-aware SASE Fabric

This is the first blog in a series about Branch Transformation with the Next Gen SASE Branch solution. Built on the Netskope One SASE platform, this innovative approach combines Context-aware SASE Fabric, Zero Trust Hybrid Security, and a SkopeAI-powered Cloud Orchestrator into a unified cloud offering. This blog delves into Context-aware SASE Fabric, the foundational tenet of the Next Gen SASE Branch solution that facilitates the convergence and sharing of context between networking and security.

Zero Trust: The Paradox Helping CISOs Enable Their Business

As we reflect on the first half of 2024, it seems to me that two defining features so far have been a litany of significant cyber attacks on companies across every sector, and widespread adoption of AI tools as businesses seek to innovate. At the heart of this storm of cyber threats is the CISO, looking to guide their business safely through potential dangers. Last month, Netskope undertook research examining how CISOs view their role and asking how they’re approaching these challenges.

REPLAY: Revisiting Play Ransomware Anti-Analysis Techniques

The Play ransomware, also known as PlayCrypt, is a ransomware that first emerged in June 2022. The ransomware has been targeting industries such as healthcare and telecommunication as well as a wide range of regions such as Latin America, Europe, and North America. The Play ransomware is known for gaining access to networks through compromised valid accounts or by exploiting specific vulnerabilities. Once inside the network, it uses a big pool of known post-exploitation tools to continue its attack.

A Leader in Both Security Service Edge and Single-Vendor SASE

Netskope is one of only two vendors positioned in the Leaders Quadrant in the Gartner Magic Quadrant reports for both key categories: Security Service Edge and Single-Vendor SASE. What’s more, the Gartner companion report, Critical Capabilities for Single-Vendor SASE, recognized Netskope as the only Single-Vendor SASE vendor that ranked among the 3 highest scoring vendors in all 3 Use Cases, with the highest score for the Zero Trust Platform Use Case (4.02/5.00).

Wiz and Netskope: Making IaaS Zero Trust Magic

Netskope and Wiz help organizations simplify and automate policy management across complex cloud environments. This partnership highlights the seamless integration between Wiz sharing security risk and threat insights to enable Netskope to modify existing policies or craft new ones automatically. Below, we present two of the primary use cases that customers leverage with our joint integration.

Combating Misinformation and Deep Fakes in Elections and Business: Q&A with David Fairman & Shamla Naidoo

Technological advances in how we create and consume media have repeatedly transformed how election campaigns are fought: social media, TV and radio were all revolutions in their times.There have always been concerns about the impact these new technologies would have on democracy: the Milwaukee Journal worried following the first televised presidential debate, in 1960, that “American Presidential campaigning will never be the same again.” Perhaps they were right…

The Hidden Dangers and Opportunities of Generative AI: What Enterprises Need to Know

Since the launch of ChatGPT in November 2022, generative AI (genAI) has seen rapid enterprise adoption. According to researchers in the Netskope Threat Labs, as of June 2024, an astonishing 96% of organizations are using various types of genAI apps. This widespread adoption is transforming how businesses operate, but with great power comes great responsibility—and risk.