Los Altos, CA, USA
Apr 23, 2019 | By Ashwin Vamshi
Netskope Threat Research Labs discovered an interesting drive-by download attack in Google. The threat actor involved in this attack initially deployed a Banking Trojan using the file cabinets template in Google sites as a delivery vehicle. The malware dubbed “LoadPCBanker” used SQL as an exfiltration channel to send the compromised victim data to the server.
Apr 16, 2019 | By Greg Mayfield
We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the third consideration in this blog post.
Apr 9, 2019 | By Greg Mayfield
While cloud service providers like Google Cloud Platform (GCP), Amazon Web Services (AWS), and Microsoft Azure have continued to expand their service offerings to protect their evolving assets, it’s still your responsibility to secure your data within these cloud environments. As your responsibility lies in providing security in the cloud vs.
Mar 27, 2019 | By Bob Gilbert
An Interesting article was published this week on CNBC about how the use of Slack worries some CEOs who say that employees ‘never shut up’ on the app. This is another example of a cloud app that is wildly popular primarily because of the way it enables seamless sharing and collaboration and how this can also lead to sensitive data loss if proper controls are not put in place.
Mar 26, 2019 | By Greg Mayfield
We’ve put together an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the second consideration in this blog post.
Feb 21, 2019 | By Netskope
Google Cloud Platform (GCP) provides a great way to save money and move faster. But administrators aren’t often aware of the best security practices and controls to implement. How do you move to GCP efficiently without increasing the risk of a security breach? Read this new whitepaper to help your organization avoid common mistakes.
Oct 9, 2018 | By Netskope
As you evaluate cloud access security brokers (CASBs) to safely enable sanctioned and unsanctioned (shadow IT) cloud services, cloud DLP is an important component of the solution. This 6-question checklist will give you specific, use case-based examples to help you differentiate between CASBs and choose the right one for your organization.
Oct 6, 2018 | By Netskope
To achieve business goals, business leaders are choosing to work with multiple cloud providers, embracing dierent clouds optimized for various services. By distributing workloads and mitigating risk, a multi-cloud approach is increasingly recognized as a good strategy for organizations that want to maximize the beneits of the cloud and also easily adapt to changing business needs. In this eBook, we focus on ive common questions about multi-cloud.
Aug 29, 2018 | By Netskope
While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Security teams need to understand their part in the shared responsibility model, where customers retain control of what security they choose to implement to protect their own content, platform, applications, systems, and networks, no differently than they would for applications in an onsite data center.
Aug 1, 2018 | By Netskope
In this white paper, we’ll share the behavior of malware infections by exploring the relationships between cloud application users and their files residing in the cloud. Netskope has observed such user-file relationships in cloud applications such as Google Drive, Dropbox, AWS, etc. in customer environments.
Feb 20, 2019 | By Netskope
Netskope's Head of IaaS Product Management, Neil King, discusses how Netskope secures your sensitive data in Public Cloud Infrastructure like GCP, Azure, and AWS.
Nov 15, 2018 | By Netskope
Netskope’s Continuous Security Assessment for AWS helps address the risk tied to misconfigurations that may lead to resources being inadvertently exposed to the internet. Netskope achieves this by continuously monitoring and auditing your AWS configuration, using the CIS benchmark, PCI-DSS, in addition to AWS best practices, to assess your compliance posture.
- June 2017 (1)
- August 2017 (4)
- September 2017 (1)
- October 2017 (2)
- December 2017 (1)
- March 2018 (9)
- April 2018 (1)
- May 2018 (2)
- June 2018 (2)
- July 2018 (3)
- August 2018 (10)
- September 2018 (5)
- October 2018 (7)
- November 2018 (5)
- December 2018 (4)
- January 2019 (3)
- February 2019 (5)
- March 2019 (8)
- April 2019 (3)