|
By Netskope
Netskope One capabilities with Microsoft tools empower enterprise customers with flexible and enhanced data protection, threat prevention, and secure access.
|
By Joe Topinka
In today’s climate, where every company is a technology company, there is a simple truth many still overlook: CIOs and CISOs can no longer afford to see themselves primarily as technologists or risk gatekeepers. The mandate is clear: They must be business leaders first, using technology and cybersecurity expertise as powerful tools to drive growth, trust, and competitive advantage.
|
By Gianpietro Cutolo
In Part 1 of this blog series, we explored the architecture, capabilities, and risks of the Model Context Protocol (MCP). In this post, we will focus on two attack vectors in the MCP ecosystem: prompt injection via tool definitions and cross-server tool shadowing. Both exploit how LLMs trust and internalize tool metadata and responses, allowing attackers to embed hidden instructions or persistently influence future tool calls without direct user prompts.
This is a follow up to the blog Cybersecurity as a Business Enabler about the shifting cybersecurity from a cost center to a value driver. If you are a C-level executive looking to transform how your organization approaches cybersecurity, here is how to shift the mindset from viewing security as just another cost center to recognizing it as a true value driver.
|
By Hubert Lin
The Domain Name System (DNS) is a critical component of internet infrastructure, responsible for translating human-readable domain names into IP addresses. However, the ubiquitous nature and often-overlooked security aspects of DNS make it a prime target for malicious actors. This blog post investigates the tools used for data exfiltration over DNS, the techniques involved, and the countermeasures to mitigate these threats.
In today’s fast-moving digital world, cybersecurity is no longer just an IT concern: it is a business imperative, and a game-changer. For many years, cybersecurity was perceived as a necessary expense, a cost center that consumed expensive resources mainly to mitigate risks and to prevent threats. But leading organizations now realize that strong cybersecurity is not just about protection, but it is a real driver of growth, customer trust, and competitive advantage.
|
By Gianpietro Cutolo
The Model Context Protocol (MCP) is a standardized framework that enables large language models (LLMs) to interact with external tools, APIs, and data sources. While MCP offers powerful integration capabilities across software development, data analysis, automation, and security operations, it also introduces serious security risks. This post provides a technical overview of how MCP works, its architecture, and real-world use cases.
|
By Colin Estep
Netskope Threat Labs is pleased to announce the release of a new open-source tool that detects supply chain attacks. Our new tool, Behavioral Evaluation of Application Metrics (BEAM), requires no endpoint agent deployment and will analyze the network traffic you are already capturing in your organization to determine if your applications are communicating with unusual hosts that could be part of an attack. This tool is the subject of a 2025 Black Hat USA briefing.
|
By Melody Nouri
Large language models (LLMs) are transforming enterprise operations, but their growing use introduces a critical security challenge: securing how they access sensitive data and integrate with existing tools. This is where Model Context Protocol (MCP) servers become a vital, yet often overlooked, part of AI security. These servers act as the crucial link, enabling LLMs to securely connect with diverse data sources and tools, significantly expanding attack surfaces that demand our immediate attention.
|
By Francisca Segovia
Any organization that’s undergone a security transformation knows the promise of zero trust network access (ZTNA): secure, least-privilege access to private applications, anywhere, on any device. But turning that promise into operational reality is often far from simple. Between fragmented tools, complex configurations, and sprawling environments, implementing ZTNA can quickly become a manual, time-consuming, and error-prone process.
|
By Netskope
Ever wonder about the "life story" of your data? When a data security alert triggers, investigating shouldn't mean guessing where your data came from or what happened to it along the way. In this episode of Ask SME Anything, Netskope expert Ankur Chadda breaks down the fundamentals of data lineage—the digital breadcrumb trail that tracks your data's journey from origin to its final destination.
|
By Netskope
This demo showcases how Netskope helps you achieve Universal Zero Trust Network Access (UZTNA). UZTNA is a unified security architecture that replaces fragmented VPN and NAC by applying consistent, context-driven Zero Trust access policies to all users and devices—whether they are connecting locally or through the cloud.
|
By Netskope
This is a demo of Netskope One AI Red Teaming Proactively identify and address vulnerabilities in private AI deployments. Automate adversarial simulations to find and fix vulnerabilities, to ensure your AI is resilient and production-ready before it reaches your users.
|
By Netskope
This is a demo covering how Netskope provides full visibility, control, and protection for Gen AI app usage.
|
By Netskope
This is a demo of the Netskope One Agentic Broker, which provides unified visibility and real-time protection for the autonomous AI ecosystem by decoding and securing Model Context Protocol (MCP) traffic between AI agents and data sources.
|
By Netskope
This is a demo of Netskope One AI Guardrails and the Netskope One AI Gateway. Netskope One AI Guardrails provides real-time content moderation for every interaction, securing the enterprise against emerging AI-specific threats including prompt injection and jailbreak attempts, and unsafe use. Netskope One AI Gateway secures the API traffic fueling your AI-powered applications. By centralizing authentication, traffic management, and content inspection between private apps and LLMs, we ensure autonomous agentic data flows remain governed and secure.
|
By Netskope
In this clip from The Stack, James Robinson, Chief Information Security Officer at Netskope, explains his unconventional path from wiring subwoofers to becoming a CISO, and his strategy for finding diverse talent.
|
By Netskope
Are agentic AI threats just hype or reality? Security Visionaries host Max Havey digs into the world of agentic AI-enabled threats and cyber espionage with guests Neil Thacker, Global Privacy and Data Protection Officer at Netskope, and Ray Canzanese, Head of Netskope Threat Labs. IN THIS EPISODE.
|
By Netskope
What does the rise of generative AI mean for the mandates of a CIO and CISO? In this episode of Security Visionaries, host Emily Wearmouth is joined by Netskope's Chief Digital & Information Officer (CDIO) and Chief Information Security Officer (CISO) to discuss top tips for both disrupting and defending your organization in the age of generative AI.
|
By Netskope
Most traditional access tools (VPNs, firewalls, and NACs) were never built for today’s hybrid world. If your legacy access tool is slowing you down, you need a different approach. In this episode of Ask SME Anything, Netskope expert Francisca Segovia explains how universal ZTNA redefines secure access for every user and device, anywhere. Life’s too short for slow connections. Reimagine your access architecture now with universal ZTNA from Netskope.
|
By Netskope
Grab your copy of the first ever book on SSE Security Service Edge (SSE) is described by Gartner as the security stack of services within a SASE architecture. SSE is fast, easy to use, and secures your business wherever your people and data go. In this book, you'll: Download the very first SSE For Dummies book on the market where we cut through the acronyms to give you a functional understanding of how this set of tools will impact your security going forward.
|
By Netskope
Google Cloud Platform (GCP) provides a great way to save money and move faster. But administrators aren't often aware of the best security practices and controls to implement. How do you move to GCP efficiently without increasing the risk of a security breach? Read this new whitepaper to help your organization avoid common mistakes.
|
By Netskope
As you evaluate cloud access security brokers (CASBs) to safely enable sanctioned and unsanctioned (shadow IT) cloud services, cloud DLP is an important component of the solution. This 6-question checklist will give you specific, use case-based examples to help you di_x001F_fferentiate between CASBs and choose the right one for your organization.
|
By Netskope
To achieve business goals, business leaders are choosing to work with multiple cloud providers, embracing di_x001F_erent clouds optimized for various services. By distributing workloads and mitigating risk, a multi-cloud approach is increasingly recognized as a good strategy for organizations that want to maximize the bene_x001E_its of the cloud and also easily adapt to changing business needs. In this eBook, we focus on _x001E_ive common questions about multi-cloud.
|
By Netskope
While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Security teams need to understand their part in the shared responsibility model, where customers retain control of what security they choose to implement to protect their own content, platform, applications, systems, and networks, no differently than they would for applications in an onsite data center.
|
By Netskope
In this white paper, we'll share the behavior of malware infections by exploring the relationships between cloud application users and their files residing in the cloud. Netskope has observed such user-file relationships in cloud applications such as Google Drive, Dropbox, AWS, etc. in customer environments.
|
By Netskope
How to deliver AWS security that guards data everywhere and stops elusive attacks. This eBook contains 5 steps you can follow to boost your AWS security posture and shows how Netskope can help you implement them.
|
By Netskope
The way people work has changed. Driven by the increasing use of cloud services and mobile devices, people now expect to be able to work at any time, from any place, and on any device. These changes are dramatically altering the network and security infrastructure in many organizations.
|
By Netskope
Everything is moving to the cloud. Certainly your apps are, with well over a thousand cloud apps in the average enterprise today. Your infrastructure is moving to the cloud too, with IaaS services such as
AWS and Azure growing at a rapid pace. Most importantly, your critical data is moving to the cloud.
|
By Netskope
Traditional security providers lack capabilities to address today's critical use cases. This eBook discusses seven of these gaps and how you can address them.
- April 2026 (1)
- March 2026 (5)
- December 2025 (3)
- November 2025 (3)
- October 2025 (4)
- September 2025 (3)
- August 2025 (8)
- July 2025 (8)
- June 2025 (11)
- May 2025 (7)
- April 2025 (4)
- March 2025 (8)
- February 2025 (8)
- January 2025 (6)
- December 2024 (4)
- November 2024 (10)
- October 2024 (12)
- September 2024 (10)
- August 2024 (9)
- July 2024 (12)
- June 2024 (8)
- May 2024 (13)
- April 2024 (13)
- March 2024 (20)
- February 2024 (9)
- January 2024 (8)
- December 2023 (6)
- November 2023 (10)
- October 2023 (20)
- September 2023 (10)
- August 2023 (10)
- July 2023 (12)
- June 2023 (17)
- May 2023 (24)
- April 2023 (14)
- March 2023 (21)
- February 2023 (11)
- January 2023 (13)
- December 2022 (15)
- November 2022 (25)
- October 2022 (12)
- September 2022 (26)
- August 2022 (24)
- July 2022 (16)
- June 2022 (17)
- May 2022 (13)
- April 2022 (8)
- March 2022 (19)
- February 2022 (16)
- January 2022 (19)
- December 2021 (18)
- November 2021 (20)
- October 2021 (16)
- September 2021 (21)
- August 2021 (15)
- July 2021 (25)
- June 2021 (19)
- May 2021 (19)
- April 2021 (21)
- March 2021 (12)
- February 2021 (11)
- January 2021 (12)
- December 2020 (8)
- November 2020 (13)
- October 2020 (12)
- September 2020 (11)
- August 2020 (9)
- June 2020 (1)
- April 2020 (1)
- September 2019 (2)
- February 2019 (2)
- January 2019 (1)
- December 2018 (1)
- November 2018 (2)
- October 2018 (3)
- September 2018 (1)
- August 2018 (3)
- June 2018 (2)
- May 2018 (2)
- April 2018 (1)
- March 2018 (9)
- December 2017 (1)
- October 2017 (2)
- September 2017 (1)
- August 2017 (4)
- June 2017 (1)
Netskope is the leader in cloud security.
We help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our patented Cloud XD technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.
Unique Capabilities:
- Eliminate Blind Spots: Patented and built in the cloud, Netskope Cloud XD™ understands SaaS, IaaS, and web in extreme definition and performs big data analytics in real time. This eliminates the blind spots across thousands of SaaS and IaaS services, and millions of websites.
- Guard Data Everywhere: Award-winning 360º data protection guards sensitive data everywhere through advanced cloud DLP and encryption across SaaS, IaaS, and web. Built in the cloud, Netskope works regardless of location or device and handles the direct-to-cloud and direct-to-web traffic that others miss.
- Stop Elusive Attacks: Only Netskope advanced threat protection stops elusive attacks across SaaS, IaaS, and web. Built in the cloud with real-time and deep detection engines, Netskope finds malware and ransomware that evade legacy tools when they traverse both cloud and web to inflict damage.
- Full Control, One Cloud: The industry’s only SaaS, IaaS, and web security platform built from the start in one cloud. Unlike other tools, Netskope eliminates policy conflict through standardized categories across SaaS, IaaS and web. Built in the cloud, Netskope scales automatically to meet your needs.
It’s time for smart cloud security.