Ask the community
Blogs
Share your ideas and insights.

Featured Posts

Sorted By:

Blog Articles

Introducing the new "Notification Portal" !!!

The new “Notification portal” provides customers an early access, easy to consume viewinto product changes coming in thenext Releaseand changes being released as part ofdynamic updatesthat are not par...

0 Comments 4 Comments 4791 Comments

Netskope Private Access for Windows Autopilot

This post will uncover how Netskope Private Access enables modern device management frameworks such as Windows Autopilot while ensuring secure least privilege connectivity to internal corporate resour...

0 Comments 4 Comments 10292 Comments

Introducing the Netskope Terraform Provider

Great news, Netskope has released a Terraform Provider that I will be introducing here. Infrastructure as Code or IaC for short, allows customers to automate create, read, update and delete infrastruc...

0 Comments 6 Comments 11783 Comments

How-to configure SSO with Okta for Netskope Cloud Exchange

This article will cover how to configure Single-Sign-On (SSO) for the Netskope Cloud Exchange (CE) platform using Okta. This will allow you to manage administrator access to CE from purely within Okta...

0 Comments 0 Comments 8985 Comments

How-to configure SSO with Azure AD for Netskope Cloud Exchange

This article will cover how to configure Single-Sign-On (SSO) for the Netskope Cloud Exchange (CE) platform using Azure Active Directory (AAD). This will allow you to manage administrator access to CE...

0 Comments 0 Comments 9824 Comments

A Guide to Deploy Netskope Cloud Exchange

This guide will cover how to deploy and get started with Netskope Cloud Exchange: A platform that facilitates the sharing of information (such as IOCs, risk scores, and logs) between different securit...

6 Comments 12 Comments 50521 Comments

CVE-2021-44228 Log4Shell/LogJam Log4j zero-day

CVE-2021-44228 (Log4Shell or LogJam) is a recently discovered zero-day vulnerability in the ubiquitous Apache Log4j Java-based logging library. It was reported by the Alibaba Cloud Security team as an...

0 Comments 0 Comments 1864 Comments

A Real-World Look at AWS Best Practices: Logging

Continuing our blog series on AWS Best Practices, we just published:https://www.netskope.com/blog/a-real-world-look-at-aws-best-practices-logging. Although CloudTrail is a well-trodden subject for AW...

0 Comments 1 Comments 11220 Comments

Who Do You Trust? Challenges with OAuth Application Identity

We just published another blog related to application risk from OAuth applications:Who Do You Trust? Challenges with OAuth Application Identity. This complements the series of blogs regarding phishing...

0 Comments 2 Comments 9983 Comments

A Real-World Look at AWS Best Pratices: Networking

We just published Part 6 of our AWS Best Practices series, we look at networking configurations with NACLs and Security Groups with respect to inbound access from the Internet to RDP and SSH, as well ...

0 Comments 1 Comments 10329 Comments

The Revolving Ransomware Door

In the same week that we report on the emergence of the BlackMatter ransomware gang, the Ragnarok gang closes up shop.

0 Comments 1 Comments 10214 Comments

AWS Best Practices: Storage

In part 5 of our continuing series on AWS Best Practices, we cover real-world stats on storage, specifically public access on buckets and encryption of EBS volumes: https://www.netskope.com/blog/a-rea...

0 Comments 2 Comments 10532 Comments

New phishing attacks abusing OAuth authorization flows

We believe there will be an increasing trend in phishing and other attacks that abuse the OAuth protocol itself in order to gain advantages such as: obtaining OAuth session tokens which bypass MFA and...

0 Comments 4 Comments 9922 Comments

OAuth Client Application Risk

We recently publishedWho Do You Trust? OAuth Client Application Trends which looks at real-world trust of applications by users using Google Identity for authentication and approval. It highlights som...

0 Comments 1 Comments 9792 Comments

AWS Best Practices: IAM Policies and Password Policies

Continuing ourblog series on AWS Best Practices, we've published two additional blogs looking at real-world AWS environments and practices around IAM policies and password policies, along with easy st...

0 Comments 0 Comments 10583 Comments

A Real-World Look at AWS Best Practices: IAM User Accounts

In our latest blog, we explore IAM best practices and AWS and highlight two findings: The majority of organizations don't enforce access key rotation for their IAM users.The majority of organizations...

0 Comments 2 Comments 10543 Comments

Malware delivered via cloud apps

Our latest Cloud and Threat Report showed that more than half of all the malware detected by users of the Netskope Security Cloud platform was downloaded from cloud apps.

1 Comments 3 Comments 24930 Comments

AWS Root Account Usage

AWS best practices say to avoid using the root account, but is everyone in your organization following this advice? We analyze data that shows surprisingly high use of AWS root accounts, often coupled...

0 Comments 1 Comments 10277 Comments

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In