Los Altos, CA, USA
Jul 16, 2019   |  By Vlad Klasnja
In the modern age of cloud-based computing, the Zero Trust model of information security is the high-water mark businesses should be striving for.
Jun 27, 2019   |  By Ashwin Vamshi
Netskope Threat Research Labs recently found an Amazon-themed phishing page hosted by Azure App Service. The phishing page was created with an intent to steal Amazon credentials and other sensitive personally identifiable information (PII) from the victims. In an earlier post, phishing in the public cloud, we detailed phishing campaigns that used public cloud hosting services to serve up parts of the attack. Here, the entirety of the attack is hosted solely in Azure.
Jun 26, 2019   |  By Bob Gilbert
I recently blogged about the two of the most common cloud security use cases that customers are covering with Netskope. I would like to continue the discussion and talk about use case #3, which is ensuring social media compliance. Even with all the upside, there are a number of challenges that are impacting the adoption of social media in the enterprise.
Jun 25, 2019   |  By Abhinav Singh
Netskope Threat Research Labs has been tracking multiple similar malspam campaigns that began in April 2019. The spam campaign contains an ISO image file as an attachment containing the next level payload. This blog post details both the campaign and the payload.
Jun 20, 2019   |  By Neil Thacker
Being CISO for a security technology vendor can be an interesting position. My job combines the usual CISO responsibilities alongside daily self and industry analysis as I support our own product teams to continually improve their understanding of, and support for my industry peers. In this role, I thought it would be interesting to share a recent experience of a security threat originating from one of our enterprise software cloud service providers.
Feb 21, 2019   |  By Netskope
Google Cloud Platform (GCP) provides a great way to save money and move faster. But administrators aren’t often aware of the best security practices and controls to implement. How do you move to GCP efficiently without increasing the risk of a security breach? Read this new whitepaper to help your organization avoid common mistakes.
Oct 9, 2018   |  By Netskope
As you evaluate cloud access security brokers (CASBs) to safely enable sanctioned and unsanctioned (shadow IT) cloud services, cloud DLP is an important component of the solution. This 6-question checklist will give you specific, use case-based examples to help you differentiate between CASBs and choose the right one for your organization.
Oct 6, 2018   |  By Netskope
To achieve business goals, business leaders are choosing to work with multiple cloud providers, embracing dierent clouds optimized for various services. By distributing workloads and mitigating risk, a multi-cloud approach is increasingly recognized as a good strategy for organizations that want to maximize the beneits of the cloud and also easily adapt to changing business needs. In this eBook, we focus on ive common questions about multi-cloud.
Aug 29, 2018   |  By Netskope
While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Security teams need to understand their part in the shared responsibility model, where customers retain control of what security they choose to implement to protect their own content, platform, applications, systems, and networks, no differently than they would for applications in an onsite data center.
Aug 1, 2018   |  By Netskope
In this white paper, we’ll share the behavior of malware infections by exploring the relationships between cloud application users and their files residing in the cloud. Netskope has observed such user-file relationships in cloud applications such as Google Drive, Dropbox, AWS, etc. in customer environments.
Feb 20, 2019   |  By Netskope
Netskope's Head of IaaS Product Management, Neil King, discusses how Netskope secures your sensitive data in Public Cloud Infrastructure like GCP, Azure, and AWS.
Jan 7, 2019   |  By Netskope
Netskope's Tech Alliances Director, David Willis, walks us through the importance and benefits of Netskope's tech alliances ecosystem.
Dec 19, 2018   |  By Netskope
In this Netskope Smart Cloud Session we cover the top 3 ways Netskope can help you secure your Office 365 environment.
Nov 15, 2018   |  By Netskope
Netskope’s Continuous Security Assessment for AWS helps address the risk tied to misconfigurations that may lead to resources being inadvertently exposed to the internet. Netskope achieves this by continuously monitoring and auditing your AWS configuration, using the CIS benchmark, PCI-DSS, in addition to AWS best practices, to assess your compliance posture.
Nov 15, 2018   |  By Netskope
Learn more about Netskope for IaaS at