Investigating .zip and .mov top-level domains
On May 3rd 2023 Google Registry announced the release of eight new top-level domains (TLD). Two of these domains share the same naming conventions as read more..
Best Practices for Email Security with SMTP proxy
The Netskope SMTP Proxy can be used as a service to scan outgoing emails over SMTP for DLP violations. In this solution, an email initiated by the use read more..
SVB a BCP and Cyber Exposure
Steps That Should be Taken by the Security Group, Business Continuity, and Finance Teams Introduction On Friday, March 10, 2023 news broke that SVB w read more..
Netskope DLP use cases for ChatGPT
With the growing popularity and use of ChatGPT, it is increasingly important to also monitor and secure private details and company confidential info read more..
Tenant Only "Shadow" Group
How do you create a "shadow" group that is only located in the tenant, not reliant on an IDP? Add the groupto the SCIM database directly usin read more..
Threat Hunting 3CX Desktop App Supply Chain Attack
On March 29, 2023, a number of security companies were warned about harmful activity that was traced back to a legitimate binary file from the communi read more..
Bypassing Zoom Traffic for Stability
Multiple users have reported issues with the stability of Zoom, as well as the performance of the application itself. Common complaints or issues rela read more..
Security posture for Salesforce application at Netskope
Salesforce is an enterprise cloud computing company that provides business software on a subscription basis. The company provides on-demand customer r read more..
A Shift Left Approach for Enterprise Security Architecture
Are you planning for a Shift Left approach for your security architecture? This document provides practical guidance on “Shift Left”, its approach and read more..
Threat Exchange Best Practices
The Netskope Threat Exchange module within Cloud Exchange is our open source solution to IoC sharing between security tools. Once configured, Threat E read more..