Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Visionaries | A Unified Approach to Identity, Network, and Data Security

In this episode of Security Visionaries, host Max Havey is joined by security leaders from Microsoft and Netskope to discuss how an ideal unified strategy brings together data, network access, and identity. They discuss what's currently "un-unified" about most security stacks and explore the topline benefits, key metrics, and the "non-negotiables" of a truly unified security approach. GUESTS: Sinead O’Donovan, VP of Product Management, Identity and Network Access at Microsoft.

Ask SME Anything: What is Unified Data Security?

Tired of the data security "alphabet soup"? DSPM. DLP. Protecting data in the AI era shouldn't require a glossary. In this episode of Ask SME Anything, Netskope expert Ankur Chadda cuts through the jargon and breaks down the fundamentals of unified data security, revealing four crucial questions every security professional must be able to answer to effectively protect your data from emerging threats.

Zero Trust Engine

The Zero Trust Engine is a foundational component of the Netskope One platform. It plays a pivotal role in gathering comprehensive risk telemetry and delivering unmatched contextual awareness to enable adaptive, least-privileged access to users, devices, applications, and data. This live demo showcases examples of how the Netskope Zero Trust engine provides full visibility and control.

Security Visionaries | I Do Love To Be BSides the CSIDES (Interview with Samantha Swift)

Get an insider's look at community-driven cybersecurity events like BSides and CSIDES. In this episode of Security Visionaries, host Emily Wearmouth sits down with cybersecurity veteran and community organizer Samantha Swift (BSides organizer, DefCon volunteer) to unpack the power of community-driven security events. We dive deep into: If you are "cyber curious" or an industry veteran looking to connect, this episode is a must-listen!

The 5 Phases of AI Adoption: An "Ask the SME" Breakdown

Welcome to the newly revamped "Ask SME Anything" series! In this series, our subject matter experts (SMEs) offer pro tips, address common pet peeves, and provide the TL;DR on the latest Netskope news and industry trends. In this video, we tackle a topic on everyone's mind: the AI adoption journey. What you'll learn: Netskope helps organizations secure every stage of their AI journey.

Why CIOs and CISOs Must Be Business Leaders First

In today’s climate, where every company is a technology company, there is a simple truth many still overlook: CIOs and CISOs can no longer afford to see themselves primarily as technologists or risk gatekeepers. The mandate is clear: They must be business leaders first, using technology and cybersecurity expertise as powerful tools to drive growth, trust, and competitive advantage.

Securing LLM Superpowers: When Tools Turn Hostile in MCP

In Part 1 of this blog series, we explored the architecture, capabilities, and risks of the Model Context Protocol (MCP). In this post, we will focus on two attack vectors in the MCP ecosystem: prompt injection via tool definitions and cross-server tool shadowing. Both exploit how LLMs trust and internalize tool metadata and responses, allowing attackers to embed hidden instructions or persistently influence future tool calls without direct user prompts.