Posted in:
Blogs
Introducing the new "Notification Portal" !!!
This new “Notification portal” provides customers an early access, easy to consume view into product... read more..
- 4791 Views
- 0 comments
- 4 Likes
The new “Notification portal” provides customers an early access, easy to consume viewinto product changes coming in thenext Releaseand changes being released as part ofdynamic updatesthat are not par...
This post will uncover how Netskope Private Access enables modern device management frameworks such as Windows Autopilot while ensuring secure least privilege connectivity to internal corporate resour...
Attack surface management (ASM) is the continued discovery, classification, and monitoring of an organization's external assets. It is crucial that teams leverage the hacker mindset to look for attack...
Great news, Netskope has released a Terraform Provider that I will be introducing here. Infrastructure as Code or IaC for short, allows customers to automate create, read, update and delete infrastruc...
This article will cover how to configure Single-Sign-On (SSO) for the Netskope Cloud Exchange (CE) platform using Okta. This will allow you to manage administrator access to CE from purely within Okta...
This article will cover how to configure Single-Sign-On (SSO) for the Netskope Cloud Exchange (CE) platform using Azure Active Directory (AAD). This will allow you to manage administrator access to CE...
This guide will cover how to deploy and get started with Netskope Cloud Exchange: A platform that facilitates the sharing of information (such as IOCs, risk scores, and logs) between different securit...
Tagging apps in Netskope tenant UI is easy. You can edit the tags of app one app at a time or in a group.
CVE-2021-44228 (Log4Shell or LogJam) is a recently discovered zero-day vulnerability in the ubiquitous Apache Log4j Java-based logging library. It was reported by the Alibaba Cloud Security team as an...
Continuing our blog series on AWS Best Practices, we just published:https://www.netskope.com/blog/a-real-world-look-at-aws-best-practices-logging. Although CloudTrail is a well-trodden subject for AW...
Are you planning your next User Group meeting? Check out the latest User Meeting PPT Template!
We just published another blog related to application risk from OAuth applications:Who Do You Trust? Challenges with OAuth Application Identity. This complements the series of blogs regarding phishing...
We just published Part 6 of our AWS Best Practices series, we look at networking configurations with NACLs and Security Groups with respect to inbound access from the Internet to RDP and SSH, as well ...
In the same week that we report on the emergence of the BlackMatter ransomware gang, the Ragnarok gang closes up shop.
In part 5 of our continuing series on AWS Best Practices, we cover real-world stats on storage, specifically public access on buckets and encryption of EBS volumes: https://www.netskope.com/blog/a-rea...
We believe there will be an increasing trend in phishing and other attacks that abuse the OAuth protocol itself in order to gain advantages such as: obtaining OAuth session tokens which bypass MFA and...
We recently published a blog,Operationalizing IP Allow Lists for Cloud Environments, talking about the process and phases for effective implementation of IP allow lists.
We recently publishedWho Do You Trust? OAuth Client Application Trends which looks at real-world trust of applications by users using Google Identity for authentication and approval. It highlights som...
Continuing ourblog series on AWS Best Practices, we've published two additional blogs looking at real-world AWS environments and practices around IAM policies and password policies, along with easy st...
In our latest blog, we explore IAM best practices and AWS and highlight two findings: The majority of organizations don't enforce access key rotation for their IAM users.The majority of organizations...
Our latest Cloud and Threat Report showed that more than half of all the malware detected by users of the Netskope Security Cloud platform was downloaded from cloud apps.
AWS best practices say to avoid using the root account, but is everyone in your organization following this advice? We analyze data that shows surprisingly high use of AWS root accounts, often coupled...
In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below
Sign In