This article will cover how to configure Single-Sign-On (SSO) for the
Netskope Cloud Exchange (CE) platform using Okta. This will allow you to
manage administrator access to CE from purely within Ok...
This article will cover how to configure Single-Sign-On (SSO) for the
Netskope Cloud Exchange (CE) platform using Azure Active Directory
(AAD). This will allow you to manage administrator access to ...
In this article, we will cover how to deploy Netskope Cloud Exchange: A
platform that facilitates the sharing of information (such as IOCs, risk
scores, and logs) between different security vendors; r...
To edit (tag) a single app, hover over the app on the main page and
click the Edit tag icon. To tag multiple apps, select the checkbox in
the top left corner for each app. Click the Edit tags icon in ...
Check out our latest blog series on AWS Best Practices on Logging!
Although CloudTrail is a well-trodden subject for AWS Security, there
were still a few interesting findings among a slice of our cust...
We just published another blog related to application risk from OAuth
applications: Who Do You Trust? Challenges with OAuth Application
Identity . This follows up on several other recent blogs related...
We just published A Real-World Look at AWS Best Practices: Networking,
part 6 of our AWS Best Practices series, looking closer at networking
configurations with NACLs and Security Groups with respect ...
The Ragnarok ransomware gang had been around since 2019, and suddenly
ceased operations today, posting a universal decrypter and instructions
on how do use it. What does this mean for the risk of rans...
In part 5 of our continuing series on AWS Best Practices, we cover
real-world stats on storage, specifically public access on buckets and
encryption of EBS volumes:
https://www.netskope.com/blog/a-rea...
We just published the first three parts of a multi-blog series on new
phishing attacks that can exploit OAuth 2.0 authorization flows:
https://www.netskope.com/blog/new-phishing-attacks-exploiting-oau...
We recently published a blog, Operationalizing IP Allow Lists for Cloud
Environments, talking about the process and phases for effective
implementation of IP allow lists. IP allow lists have tradition...
We recently published Who Do You Trust? OAuth Client Application Trends
which looks at real-world trust of applications by users using Google
Identity for authentication and approval. It highlights so...
Continuing our blog series on AWS Best Practices, we've published two
additional blogs looking at real-world AWS environments and practices
around IAM policies and password policies, along with easy s...
In our latest blog, we explore IAM best practices and AWS and highlight
two findings: The majority of organizations don't enforce access key
rotation for their IAM users. The majority of organizations...
Our latest blog post shares stats that show the amount of malware
delivered via cloud apps continues to increase. Cybercriminals are
deliberately abusing popular cloud apps for malware delivery to exp...
The blog post shares the details of our analysis:
https://www.netskope.com/blog/a-real-world-look-at-aws-best-practices-root-accounts
The Netskope Security Cloud makes it easy for you to check if your...