Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Netskope's Log Streaming Supercharges Your SOC

In today’s cloud-first world, security teams need real-time, actionable visibility into user activity and threats across the web, cloud, and private apps. The newly announced Netskope Log Streaming delivers just that. Netskope’s Log Streaming solution delivers significant value by providing real-time access to all Netskope-generated security logs directly into customers’ preferred cloud storage and last mile security information and event management (SIEM) tools.

Netskope Expands Technology Partner Ecosystem with New Integrations

At Netskope, we are relentlessly focused on empowering our customers to stay ahead of the curve in the face of the increasingly dynamic threat landscape. We’re thrilled to announce the expansion of our technology partner ecosystem through innovative new integrations. These strategic alliances with industry-leading companies are designed to deliver even more comprehensive protection and unparalleled visibility across your critical cloud environments. These new integration areas include.

Netskope's 20/20 Vision and Recognition as a SASE Leader

Netskope has been named a Leader in the 2025 Gartner Magic QuadrantTM for SASE Platforms. This is the second successive year, and we are now positioned furthest in vision in the Gartner Magic QuadrantTM reports for BOTH SASE Platforms and SSE. That’s what we, at Netskope, call “20/20 Vision.” In this year’s 2025 Critical Capabilities for SASE Platforms report, Gartner defined four key Use Cases.

Are Your VPNs and NACs Secretly Sabotaging Your Security?

For many, the answer still involves legacy VPNs and Network Access Control (NAC), familiar tools from a different era. But what if those trusted systems aren’t protecting you anymore, and are instead becoming some of your biggest liabilities? To explore this shift, Netskope partnered with Cybersecurity Insiders, a leading research platform for CISOs and cybersecurity professionals, to dig into the real risks of relying on outdated access solutions.

DeepSeek Deception: Sainbox RAT & Hidden Rootkit Delivery

Netskope Threat Labs has discovered a campaign using fake installers to deliver the Sainbox RAT and Hidden rootkit. During our threat hunting activities, we encountered multiple installers disguised as legitimate software, including WPS Office, Sogou, and DeepSeek. These installers were mainly MSI files that were delivered via phishing websites. Both the phishing pages and installers were in Chinese, indicating that the targets are Chinese speakers.

The Power of Patents as Netskope "Customer Zero"

As Netskope approaches the 300 patent milestone, I sat down for a quick chat with our CISO James Robinson to hear about the most recent patent granted to his team, find out why he sees patents as being so important, and discover what they tell us about the way his team—the team in charge of cybersecurity at a cybersecurity company—innovates.

Accelerate Intelligence with Automated & Unified Data Security

When it comes to data security, you want it to be accurate, reliable, thorough, and fast. Ideally, faster today than it was yesterday, and faster tomorrow than it was today, to address increasing data security needs in the same amount of time or less. We’re seeing a growing prevalence of employees using unmanaged devices, handling sensitive organizational structured and unstructured data, and accessing managed and unmanaged apps with those devices and that data.

Planning for a Post-quantum World, Now!

One of the primary concerns occupying future-gazers within the technology industry is the impact that quantum advances will have upon established encryption methods. Quantum computing is advancing at pace, and alongside the enthusiasm for what that will enable is a practical concern for the way quantum processing might render some of today’s security approaches ineffective.

Beyond VPNs: Secure Remote Access for OT & IIoT

Everybody loves a good throwback. Flip phones, vinyl records, and maybe even the dial-up tone for nostalgia’s sake. But if your operational technology (OT) and industrial internet of things (IIoT) environment is still relying on traditional VPNs to connect users, vendors, and machines, that’s one throwback you really don’t want. OT systems have evolved. They’re smarter, more connected, and unfortunately more vulnerable than ever.