Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Can traditional pen testing keep up with modern AppSec? Ask the pen tester

You have kicked-off your annual application security assessment, but by the time the final report comes in, so have a bunch of new features from your developers. Since your pen test report can’t keep-up with your modern development cycles, it is now (and always) obsolete. You can check-off your compliance checkbox, but you’re not anymore secure than you were before. If this sounds familiar, it is clearly time for an update.

5 Reasons to Implement Zero Trust & 5 Steps to Get You Started

The zero trust security approach has gained traction for its effectiveness in improving organizations’ resilience against emerging cyber threats. In this article, we outline five up-to-date statistical facts which make the case for zero trust. You will also learn five simple steps to start implementing zero trust architecture without major investments.

Maximizing security insights: A deep dive into the Amazon Security Lake and Elastic Security integration

In the ever-evolving landscape of cybersecurity, having a robust and efficient security information and event management (SIEM) system is crucial. One powerful solution that has gained significant traction is the Elastic® integration with Amazon Security Lake. This integration not only facilitates the collection of security-related log and event data, but also empowers organizations to analyze and understand their security posture comprehensively.

Introducing hostname and ASN lists to simplify WAF rules creation

If you’re responsible for creating a Web Application Firewall (WAF) rule, you’ll almost certainly need to reference a large list of potential values that each field can have. And having to manually manage and enter all those fields, for numerous WAF rules, would be a guaranteed headache.

What's in Store for 2024: Predictions About Zero Trust, AI, and Beyond

With 2024 on the horizon, we have once again reached out to our deep bench of experts here at Netskope to ask them to do their best crystal ball gazing and give us a heads up on the trends and themes that they expect to see emerging in the new year. We’ve broken their predictions out into four categories: AI, Geopolitics, Corporate Governance, and Skills. Here’s what our experts think is in store for 2024.

Rubrik and Microsoft: Pioneering the Future of Cybersecurity with Generative AI

We’re excited to announce Rubrik as one of the first enterprise backup providers in the Microsoft Security Copilot Partner Private Preview, enabling enterprises to accelerate cyber response times by determining the scope of attacks more efficiently and automating recoveries. Ransomware attacks typically result in an average downtime of 24 days. Imagine your business operations completely stalled for this duration.

Rubrik Unveils Rapid Cyber Recovery for Large Enterprises Using Microsoft 365 Backup Storage

Every day more than 2 billion documents and emails are added to Microsoft 365, making this critical data a priority target for ransomware and other cyber attacks. After all, 61% of attacks affect SaaS applications, the most targeted platform / environment. This data can also often be unstructured, and rapidly processing and managing the content at enterprise scale is critical when it comes to both applying protection and performing restores.

How Rubrik Enhances Protection and Speeds Recovery for Microsoft 365 Backup Storage

What if a malicious attack deleted your Microsoft Entra ID (formerly Azure Active Directory) objects? Or what if hundreds of objects get deleted across your Microsoft OneDrive account from a rogue script? Think about it. If you’re a large enterprise customer, would you be prepared to rapidly recover from these scenarios at scale?

How Corelight Uses AI to Empower SOC Teams

The explosion of interest in artificial intelligence (AI) and specifically large language models (LLMs) has recently taken the world by storm. The duality of the power and risks that this technology holds is especially pertinent to cybersecurity. On one hand the capabilities of LLMs for summarization, synthesis, and creation (or co-creation) of language and content is mind-blowing.