Ask the community
Learn
Reimagine your perimeter with Netskope. Find training and blogs on all things related to cloud, network, and data security.
  • Recent
  • Solved
  • Unsolved
  • Unanswered
Filters:
By: Netskope
Investigating .zip and .mov top-level domains

On May 3rd 2023 Google Registry announced the release of eight new top-level domains (TLD). Two of these domains share the same naming conventions as read more..

By: Netskope
Best Practices for Email Security with SMTP proxy

The Netskope SMTP Proxy can be used as a service to scan outgoing emails over SMTP for DLP violations. In this solution, an email initiated by the use read more..

By: Netskope
SVB a BCP and Cyber Exposure

Steps That Should be Taken by the Security Group, Business Continuity, and Finance Teams Introduction On Friday, March 10, 2023 news broke that SVB w read more..

By: Netskope
Netskope DLP use cases for ChatGPT

With the growing popularity and use of ChatGPT, it is increasingly important to also monitor and secure private details and company confidential info read more..

By: Netskope
Tenant Only "Shadow" Group

How do you create a "shadow" group that is only located in the tenant, not reliant on an IDP? Add the groupto the SCIM database directly usin read more..

By: Netskope
Threat Hunting 3CX Desktop App Supply Chain Attack

On March 29, 2023, a number of security companies were warned about harmful activity that was traced back to a legitimate binary file from the communi read more..

By: Netskope
Bypassing Zoom Traffic for Stability

Multiple users have reported issues with the stability of Zoom, as well as the performance of the application itself. Common complaints or issues rela read more..

By: Netskope
Security posture for Salesforce application at Netskope

Salesforce is an enterprise cloud computing company that provides business software on a subscription basis. The company provides on-demand customer r read more..

By: Netskope
A Shift Left Approach for Enterprise Security Architecture

Are you planning for a Shift Left approach for your security architecture? This document provides practical guidance on “Shift Left”, its approach and read more..

By: Moderator
Threat Exchange Best Practices

The Netskope Threat Exchange module within Cloud Exchange is our open source solution to IoC sharing between security tools. Once configured, Threat E read more..

Load more
Jump to another board

Browse the Community

Academy Training

Join the latest sessions led by expert instructors, connect with your peers, and provide feedback. L...

9 Posts

Inside Netskope Security

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help org...

14 Posts

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In