Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO Dashboard

Help upper management understand KPIs for your security program. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

What Happens When Facebook Goes Down?

On Monday, October 4, 2021, Facebook suffered a prolonged outage when, during routine maintenance, all connections to their global backbone network were mistakenly taken down. More details on the cause and response to the outage are available on the Facebook blog. At Netskope, we help secure the cloud and web traffic of millions of users worldwide. In this blog post, we provide a glimpse into what the Facebook outage looked like from our perspective.

Explorer Walkthrough Quick Tour (Part 1)

Start building dashboards and widgets using the tools in Explore. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

When should a startup call the FBI

For this 11th episode of Access Control Podcast, a podcast providing practical security advice for startups, Developer Relations Engineer at Teleport Ben Arent chats with Elvis Chan. Elvis is Assistant Special Agent in charge assigned to the San Francisco FBI Field office. Chan manages a squad responsible for investigating national security cyber matters and has over 14 years of experience in the bureau.

Automating Cloud Security Posture Management Remediation

When we discuss cybersecurity and the threat of cyber attacks, many may conjure up the image of skillful hackers launching their attacks by way of undiscovered vulnerabilities or using cutting-edge technology. While this may be the case for some attacks, more often than not, vulnerabilities are revealed as a result of careless configuration and inattention to detail. Doors are left open and provide opportunities for attacks.

Everything You Need to Know About Open Banking Security

Financial services have developed at a breakneck pace, resulting in fierce competition among financial technologies. These services in the digital age must be characterized by three words: rapid, efficient, and intuitive. It is no longer necessary to wait in queues to speak with a bank teller. Consumers today want to manage their accounts using their smartphones, and banks want to earn their loyalty. What is the common ground? Using modern technologies to find new methods of doing things.