Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Redefining Transparency: Netskope Trust Portal 2.0 and DEM

In the world of cloud services, transparency has often been treated as a box to check rather than a cornerstone of innovation. Trust and status portals, once an innovative approach for offering visibility into service health and availability, now largely feel stagnant and table stakes providing the bare minimum. But is transparency and visibility just a “nice-to-have”? Some might think so. At Netskope, we see it differently.

Operation Phantom Circuit: North Korea's Global Data Exfiltration Campaign

In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.

Unmasking Shadow AI: What Is it and How Can You Manage it?

Since the launch of ChatGPT in late 2022, gen AI (generative artificial intelligence) has transformed nearly every facet of our lives, including our professions and workplace environments. Adoption has been driven by employees looking for faster, better ways to perform. For example, applications like ChatGPT, DALL-E, and Jasper are helping employees across industries boost productivity, overcome roadblocks, and brainstorm creative solutions.

A Comprehensive Guide to Healthcare Cybersecurity

The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient data.

Cloud security research and guide roundup: DevSecOps, threat detection, and AI

In Part 1 of our cloud security research and guide roundup, we looked at our contributions to helping you manage cloud infrastructure, data, identities, and access. In Part 2, we share our research, insights, and guides from Datadog Security Labs and The Monitor that support the NSA’s cloud mitigation strategies in the following areas: We’ll also go beyond these common strategies to look at how security plays a role in working with LLMs.

Top Fuzz Testing Tools of 2025: Feature Comparison

In 2025, fuzz testing has become an essential practice for ensuring software security and reliability. By identifying vulnerabilities through randomized input testing, fuzzing helps development teams uncover bugs that traditional testing methods—such as static analysis and penetration testing—often miss. With rapid advancements in security tools, let’s explore the top fuzz testing tools of 2025, their key features, benefits, and how they compare.

11:11 Systems Object Storage in Veeam Data Platform 12.3

With the 12.3 release of the Veeam Data Platform, integrating 11:11 Systems’ low-cost, Veeam-optimized Cloud Object Storage just got a whole lot easier. Now directly built into the Veeam UIs for both Backup & Replication and Veeam ONE, this integration gives you the best of both worlds—a seamless, streamlined setup and the unmatched efficiency of 11:11 Systems’ partnership with AWS S3.

Can You Really Block Bots with Robots.txt? The Truth Behind Bot Control

If you’re looking for a quick way to block bots with robots.txt, you may be disappointed to learn that it’s not as effective as many people think. Robots.txt is often discussed as a simple solution for controlling crawler traffic, but in reality, it provides very limited protection.

The Evolving Role of AI in Data Protection

Each year, Data Protection Day marks an opportunity to assess the state of privacy and security in the midst of technological innovation. This year’s inflection point follows a robust dialogue on AI from last week’s World Economic Forum Annual Meeting in Davos. As CrowdStrike participated in these discussions, we emphasized the importance of leveraging AI to defend against ever-evolving cyber threats and protect the very data and workloads used to power AI.