Ask the community
Share your ideas and insights.

Featured Posts

Sorted By:

Blog Articles

Netskope for Mobile - Rollout Approach

How to approach Netskope rollout on Mobile footprint? What tools will be required? What are the best practices? This post will cover an entire ecosystem and it's role for successful Mobile deployment.

0 Comments 0 Comments 431 Comments

Netskope Private Access and Cloud Exchange running in Azure

Netskope Private Access and Cloud Exchange running in Azure Overview Using Netskope’s Private Access (NPA) can help secure workloads in Azure like deploying Netskope’s Cloud Exchange there. In this so...

0 Comments 4 Comments 757 Comments

Netskope's Capabilities on Mobile Platforms

I am excited to start a series of posts covering Netskope for Mobile. This kick-off note will provide an overview of Netskope's capabilities on mobile platforms. In the upcoming posts, I will delve in...

0 Comments 2 Comments 752 Comments

Netskope Administration for Departing Users

When a user announces their departure from the organization, it's crucial to implement stringent controls and checks to protect corporate data and resources. The user's account should immediately be p...

0 Comments 1 Comments 466 Comments

Netskope Administration for Contractors & Third Parties

Contractors and third parties often require access to company resources to fulfill their tasks, yet they exist outside the organization's direct control and may not be fully aligned with the company's...

0 Comments 0 Comments 535 Comments

Netskope Administration for Developers

While it is necessary to provide adequate security measures in your environment, it's important to be aware of the unique needs of your developers and coders. Their work often involves accessing and i...

0 Comments 0 Comments 368 Comments

Introducing the new "Notification Portal" !!!

The new “Notification portal” provides customers an early access, easy to consume viewinto product changes coming in thenext Releaseand changes being released as part ofdynamic updatesthat are not par...

0 Comments 4 Comments 5357 Comments

Netskope Private Access for Windows Autopilot

This post will uncover how Netskope Private Access enables modern device management frameworks such as Windows Autopilot while ensuring secure least privilege connectivity to internal corporate resour...

0 Comments 5 Comments 11726 Comments

Managing Netskope Publishers in AWS using Terraform

For those that are new to Terraform let me start by explaining what amoduleis. The definition of a module is something along the lines of 1 or more .tf configuration files in the same directory. Based...

2 Comments 3 Comments 27270 Comments

Introducing the Netskope Terraform Provider

Great news, Netskope has released a Terraform Provider that I will be introducing here. Infrastructure as Code or IaC for short, allows customers to automate create, read, update and delete infrastruc...

0 Comments 7 Comments 13093 Comments

How-to configure SSO with Okta for Netskope Cloud Exchange

This article will cover how to configure Single-Sign-On (SSO) for the Netskope Cloud Exchange (CE) platform using Okta. This will allow you to manage administrator access to CE from purely within Okta...

0 Comments 0 Comments 9568 Comments

How-to configure SSO with Azure AD for Netskope Cloud Exchange

This article will cover how to configure Single-Sign-On (SSO) for the Netskope Cloud Exchange (CE) platform using Azure Active Directory (AAD). This will allow you to manage administrator access to CE...

0 Comments 0 Comments 10407 Comments

A Guide to Deploy Netskope Cloud Exchange

This guide will cover how to deploy and get started with Netskope Cloud Exchange: A platform that facilitates the sharing of information (such as IOCs, risk scores, and logs) between different securit...

6 Comments 14 Comments 56308 Comments

CVE-2021-44228 Log4Shell/LogJam Log4j zero-day

CVE-2021-44228 (Log4Shell or LogJam) is a recently discovered zero-day vulnerability in the ubiquitous Apache Log4j Java-based logging library. It was reported by the Alibaba Cloud Security team as an...

0 Comments 0 Comments 2323 Comments

A Real-World Look at AWS Best Practices: Logging

Continuing our blog series on AWS Best Practices, we just published: Although CloudTrail is a well-trodden subject for AW...

0 Comments 1 Comments 11676 Comments

Who Do You Trust? Challenges with OAuth Application Identity

We just published another blog related to application risk from OAuth applications:Who Do You Trust? Challenges with OAuth Application Identity. This complements the series of blogs regarding phishing...

0 Comments 2 Comments 10361 Comments

A Real-World Look at AWS Best Pratices: Networking

We just published Part 6 of our AWS Best Practices series, we look at networking configurations with NACLs and Security Groups with respect to inbound access from the Internet to RDP and SSH, as well ...

0 Comments 1 Comments 10800 Comments

The Revolving Ransomware Door

In the same week that we report on the emergence of the BlackMatter ransomware gang, the Ragnarok gang closes up shop.

0 Comments 1 Comments 10631 Comments

AWS Best Practices: Storage

In part 5 of our continuing series on AWS Best Practices, we cover real-world stats on storage, specifically public access on buckets and encryption of EBS volumes:

0 Comments 2 Comments 10952 Comments

New phishing attacks abusing OAuth authorization flows

We believe there will be an increasing trend in phishing and other attacks that abuse the OAuth protocol itself in order to gain advantages such as: obtaining OAuth session tokens which bypass MFA and...

0 Comments 4 Comments 10341 Comments

OAuth Client Application Risk

We recently publishedWho Do You Trust? OAuth Client Application Trends which looks at real-world trust of applications by users using Google Identity for authentication and approval. It highlights som...

0 Comments 1 Comments 10216 Comments

AWS Best Practices: IAM Policies and Password Policies

Continuing ourblog series on AWS Best Practices, we've published two additional blogs looking at real-world AWS environments and practices around IAM policies and password policies, along with easy st...

0 Comments 0 Comments 10908 Comments

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In