Blogs
Share your ideas and insights.
cancel
Showing results for 
Search instead for 
Did you mean: 

Blog Articles

A Real-World Look at AWS Best Pratices: Networking

We just published A Real-World Look at AWS Best Practices: Networking, part 6 of our AWS Best Practices series, looking closer at networking configurations with NACLs and Security Groups with respect ...

0 Comments

The Revolving Ransomware Door

The Ragnarok ransomware gang had been around since 2019, and suddenly ceased operations today, posting a universal decrypter and instructions on how do use it. What does this mean for the risk of rans...

0 Comments

AWS Best Practices: Storage

In part 5 of our continuing series on AWS Best Practices, we cover real-world stats on storage, specifically public access on buckets and encryption of EBS volumes: https://www.netskope.com/blog/a-rea...

0 Comments

New phishing attacks abusing OAuth authorization flows

We just published the first three parts of a multi-blog series on new phishing attacks that can exploit OAuth 2.0 authorization flows: https://www.netskope.com/blog/new-phishing-attacks-exploiting-oau...

0 Comments

Operationalizing IP Allow Lists for Cloud Environments

We recently published a blog, Operationalizing IP Allow Lists for Cloud Environments, talking about the process and phases for effective implementation of IP allow lists. IP allow lists have tradition...

0 Comments

OAuth Client Application Risk

We recently published Who Do You Trust? OAuth Client Application Trends which looks at real-world trust of applications by users using Google Identity for authentication and approval. It highlights so...

0 Comments

AWS Best Practices: IAM Policies and Password Policies

Continuing our blog series on AWS Best Practices, we've published two additional blogs looking at real-world AWS environments and practices around IAM policies and password policies, along with easy s...

0 Comments

Malware delivered via cloud apps

Our latest blog post shares stats that show the amount of malware delivered via cloud apps continues to increase. Cybercriminals are deliberately abusing popular cloud apps for malware delivery to exp...

1 Comments

AWS Root Account Usage

The blog post shares the details of our analysis: https://www.netskope.com/blog/a-real-world-look-at-aws-best-practices-root-accounts The Netskope Security Cloud makes it easy for you to check if your...

0 Comments