cancel
Showing results for 
Search instead for 
Did you mean: 

Inside Netskope Security

Discussions

Bypassing Zoom Traffic for Stability

Multiple users have reported issues with the stability of Zoom, as well as the performance of the application itself. Common complaints or issues relating to audio dropping, audio quality, and screen redraws or slowness painting the screen. Due to th...

CISO Community Blog Image.png
stevan by Netskope
  • 1946 Views
  • 0 replies
  • 2 Likes

Threat Exchange Best Practices

The Netskope Threat Exchange module within Cloud Exchange is our open source solution to IoC sharing between security tools. Once configured, Threat Exchange can store and share thousands of IoC’s from tools such as Netskope, CrowdStrike, Microsoft D...

jramirez_0-1672245201094.png jramirez_1-1672245201145.png jramirez_2-1672245201209.png jramirez_3-1672245201086.png
jramirez by Moderator
  • 4524 Views
  • 0 replies
  • 3 Likes

PostgreSQL vulnerabilities and their preventions

PostgreSQL is the world’s most advanced enterprise-class open source database management system that is developed by the PostgreSQL Global Development Group. It is a powerful and highly-extensible object-relational SQL (Structured Query Language) dat...

CISO Community Blog Image.png
mharsh by Netskope
  • 4275 Views
  • 0 replies
  • 1 Likes

Netskope Alerts via Slack Messages

Netskope Alerts via Slack Messages Prerequisites: Slack channel with a webhook.https://slack.com/help/articles/115005265063-Incoming-webhooks-for-Slack Cloud Exchange version 3.2 and above. Netskope Tenant added to Cloud Exchange. Procedure: Step 1. ...

jramirez_0-1672243995101.png jramirez_1-1672243995108.png jramirez_2-1672243995110.png jramirez_3-1672243995105.png
jramirez by Moderator
  • 4038 Views
  • 0 replies
  • 1 Likes

Effective Allowlisting with Netskope DLP

Are you facing excessive Netskope DLP alerts which are false positives? The Netskope DLP solution provides a wide range of capabilities for detecting data theft and data mishandling. While setting up these policies, one of the common difficulties a s...

ukrishna_0-1671719093739.png ukrishna_1-1671719093721.png ukrishna_2-1671719093598.png ukrishna_3-1671719093597.png
ukrishna by Netskope
  • 4253 Views
  • 0 replies
  • 1 Likes

The Threat Hunt Process

Requirements Transaction Streaming SKU What is Threat Hunting? Threat hunting is the process of using the scientific method to proactively and iteratively search through an organization's environment to identify threats that have evaded detection. On...

AFunkhouser_0-1670338542838.png AFunkhouser_1-1670338542828.png AFunkhouser_2-1670338542827.png AFunkhouser_3-1670338542825.png

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In