Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

2020 Gartner Market Guide for Software Composition Analysis

The 2020 Gartner Market Guide for SCA is here! Recent Gartner survey finds that over 90% of organizations leverage OSS in application development - and as a result, security of open source packages was the highest ranked concern for respondents. These concerns have led to a growing market, addressed by various vendors for SCA tools that mitigate the risk of OSS. New trends emerge with devops on the rise - as the market shifts towards developer-friendly SCA tools.

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible security implications.

Emerging Public Cloud Security Challenges in 2020 and Beyond

According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end of this year, up from $USD 227.8 billion just a year ago. Clearly, cloud computing is making its way to cloud nine, (See what I did there?) leveraging the sweet fruits of being in the spotlight for a decade. However, the threats to public cloud security are growing at the same rate.

AppSec Decoded: The consequences of insecure IoT devices

Watch the latest video in our AppSec Decoded series to learn why manufacturers should consider building security into their IoT devices. Application Security Decoded: Manufacturers should build security into their IoT devices | Synopsys - YouTube An error occurred. Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

Keeping Your Data Safe in the "Gig Economy"

As workforces continue to evolve and adapt to the COVID-19 pandemic, the door is open for organizations to hire workers from anywhere around the country to offer their skills remotely as needed, often as a freelancer or gig worker. While this outgrowth of the burgeoning gig economy stands to benefit many businesses in need, it’s important that you assess your risk of utilizing gig workers and freelancers.

Understanding an API Provider's Privacy Policy

Regardless of what industry your company belongs to, you are obligated to think about the privacy of your customers. Not only is it good business, but privacy expectations have been set through regulations like the EU’s General Data Protection Regulation (GDPR), California’s Consumer Privacy Act (CCPA), and many others across the world.

Here Comes 2021: 5 Safe Bets and 5 Long Shot Predictions

As we learned in 2020, vendors predict, and the universe laughs. But this year we polled our experts at Netskope to get their view of the year to come. Here’s how we see 2021 shaping up for networking and security, in the form of some pretty safe bets, and some harder calls. As more organizations consolidate and move away from appliance-based security technologies, IT and security teams will realize the cost savings and operational efficiencies the move to cloud brings.

Demo: Using Netskope policies to deliver Okta authenticated access to any cloud application

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to apply strong authentication to any cloud application. This demo shows how Netskope can challenge a user for Okta authentication when they attempt to access an unmanaged cloud application.

Demo: Using Netskope policies to deliver Okta authentication challenges based on risky user behavior

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to challenge users for authentication when they perform risky activities. In this example, the uploading of sensitive data to a cloud application will trigger an authentication challenge before allowing the activity to complete.

Demo: Netskope preventing data exfiltration to personal devices from cloud apps managed by Okta

When Okta is integrated with Netskope's Next Generation Secure Web Gateway (NG SWG) it becomes possible to apply data protection policies to unmanaged devices accessing managed cloud applications. These policies are typically configured to prevent the downloading of sensitive data from cloud applications to personal or BYOD devices.