cancel
Showing results for 
Search instead for 
Did you mean: 

Blogs

Blog Articles

Introducing the new "Notification Portal" !!!

This new “Notification portal” provides customers an early access, easy to consume view into product changes coming in the next Release and changes being released as part of dynamic updates that are n...

0 Comments

Netskope Private Access for Windows Autopilot

Solution Overview Windows Autopilot Overview Traditionally IT administrators spend a lot of time on building and customizing OS images, compatibility testing with various device makes and models etc. ...

0 Comments

Managing Netskope Publishers in AWS using Terraform

Introduction In my previous post I introduced the Netskope Provider for Terraform and showed you how it can be used to deploy publishers and applications inside of a Netskope tenant. While I think thi...

2 Comments

Introducing the Netskope Terraform Provider

Introduction I am super excited to announce that the Netskope security cloud can now be managed as code. "How is this possible?", you might ask. The answer is by using the newly released Terraform pro...

0 Comments

A Guide to Deploy Netskope Cloud Exchange

In this article, we will cover how to deploy Netskope Cloud Exchange: A platform that facilitates the sharing of information between your different security vendors. What is Cloud Exchange? Cloud Exch...

5 Comments

CVE-2021-44228 Log4Shell/LogJam Log4j zero-day

CVE-2021-44228 (Log4Shell or LogJam) is a recently discovered zero-day vulnerability in the ubiquitous Apache Log4j Java-based logging library. It was reported by the Alibaba Cloud Security team as an...

0 Comments

A Real-World Look at AWS Best Practices: Logging

Check out our latest blog series on AWS Best Practices on Logging! Although CloudTrail is a well-trodden subject for AWS Security, there were still a few interesting findings among a slice of our cust...

0 Comments

User Group Meeting PowerPoint Template

Why create a brand new PPT meeting deck every time you host a User Group?! Check out our latest User Group PPT template attached below!   Every quarter our Community team will update this PPT to inclu...

0 Comments

A Real-World Look at AWS Best Pratices: Networking

We just published A Real-World Look at AWS Best Practices: Networking, part 6 of our AWS Best Practices series, looking closer at networking configurations with NACLs and Security Groups with respect ...

0 Comments

The Revolving Ransomware Door

The Ragnarok ransomware gang had been around since 2019, and suddenly ceased operations today, posting a universal decrypter and instructions on how do use it. What does this mean for the risk of rans...

0 Comments

AWS Best Practices: Storage

In part 5 of our continuing series on AWS Best Practices, we cover real-world stats on storage, specifically public access on buckets and encryption of EBS volumes: https://www.netskope.com/blog/a-rea...

0 Comments

New phishing attacks abusing OAuth authorization flows

We just published the first three parts of a multi-blog series on new phishing attacks that can exploit OAuth 2.0 authorization flows: https://www.netskope.com/blog/new-phishing-attacks-exploiting-oau...

0 Comments

Operationalizing IP Allow Lists for Cloud Environments

We recently published a blog, Operationalizing IP Allow Lists for Cloud Environments, talking about the process and phases for effective implementation of IP allow lists. IP allow lists have tradition...

0 Comments

OAuth Client Application Risk

We recently published Who Do You Trust? OAuth Client Application Trends which looks at real-world trust of applications by users using Google Identity for authentication and approval. It highlights so...

0 Comments

AWS Best Practices: IAM Policies and Password Policies

Continuing our blog series on AWS Best Practices, we've published two additional blogs looking at real-world AWS environments and practices around IAM policies and password policies, along with easy s...

0 Comments

Malware delivered via cloud apps

Our latest blog post shares stats that show the amount of malware delivered via cloud apps continues to increase. Cybercriminals are deliberately abusing popular cloud apps for malware delivery to exp...

1 Comments

AWS Root Account Usage

The blog post shares the details of our analysis: https://www.netskope.com/blog/a-real-world-look-at-aws-best-practices-root-accounts The Netskope Security Cloud makes it easy for you to check if your...

0 Comments

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In