Los Altos, CA, USA
Jan 21, 2020   |  By Vlad Klasnja
It’s inevitable that building a security program based on Zero Trust will drastically decrease an organization’s risk exposure. While North/South traffic was traditionally controlled by firewalls, this strategy has failed. Today, one of the biggest challenges within an organization’s perimeter is preventing lateral movement of both threats and data.
Jan 17, 2020   |  By Ashwin Vamshi
We’ve all gotten used to a trust model on the Internet, and it’s mostly worked. We trust we have a private connection to a website because of the HTTPS certificates presented by the server and verified by our browser. Our browsers are fairly good at warning us when there is a problem, like invalid certificates. So, we confidently send credit card numbers, bank account information, and other information over the Internet, knowing that these technologies will keep us safe.
Jan 14, 2020   |  By Vlad Klasnja
I love Charlie CISO, created by NYU professor Ed Amoroso and Mad Magazine Illustrator Rich Powell. As per Amoroso, it was invented to wallow in the familiar mix of competence and hypocrisy that defines our cyber security space. There is a lot of confusion in the industry around how to determine the proper definition for Zero Trust.
Jan 9, 2020   |  By Erick Galinkin
Cross-Origin Resource Sharing (CORS) is a mechanism which uses HTTP headers to tell a browser that a web application running at one origin has permission to access selected resources from a server at a different origin. This functionality exists for cases where an application developer would want to deliberately ignore a same origin policy (SOP) which mitigates many common attacks against browsers (notably cross-site scripting).
Dec 18, 2019   |  By Jason Clark
Just like every year, we’ve seen the cybersecurity industry shift and change quite a bit in 2019. Finding new threats, building new infrastructure, and uncovering new risks both in and out of the cloud. WIth 2020 looming on the horizon, there’s plenty to unpack and predict what’s next for the security industry as we kickoff the new year.
Feb 21, 2019   |  By Netskope
Google Cloud Platform (GCP) provides a great way to save money and move faster. But administrators aren't often aware of the best security practices and controls to implement. How do you move to GCP efficiently without increasing the risk of a security breach? Read this new whitepaper to help your organization avoid common mistakes.
Oct 9, 2018   |  By Netskope
As you evaluate cloud access security brokers (CASBs) to safely enable sanctioned and unsanctioned (shadow IT) cloud services, cloud DLP is an important component of the solution. This 6-question checklist will give you specific, use case-based examples to help you differentiate between CASBs and choose the right one for your organization.
Oct 6, 2018   |  By Netskope
To achieve business goals, business leaders are choosing to work with multiple cloud providers, embracing dierent clouds optimized for various services. By distributing workloads and mitigating risk, a multi-cloud approach is increasingly recognized as a good strategy for organizations that want to maximize the beneits of the cloud and also easily adapt to changing business needs. In this eBook, we focus on ive common questions about multi-cloud.
Aug 29, 2018   |  By Netskope
While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Security teams need to understand their part in the shared responsibility model, where customers retain control of what security they choose to implement to protect their own content, platform, applications, systems, and networks, no differently than they would for applications in an onsite data center.
Aug 1, 2018   |  By Netskope
In this white paper, we'll share the behavior of malware infections by exploring the relationships between cloud application users and their files residing in the cloud. Netskope has observed such user-file relationships in cloud applications such as Google Drive, Dropbox, AWS, etc. in customer environments.
Sep 25, 2019   |  By Netskope
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Reimagine your perimeter with Netskope.
Sep 25, 2019   |  By Netskope
Netskope's vision is to redefine cloud, network, and data security to reimagine your perimeter in a data-centric, cloud smart, and fast way to make your security teams significantly more efficient and effective.
Feb 20, 2019   |  By Netskope
Netskope's Head of IaaS Product Management, Neil King, discusses how Netskope secures your sensitive data in Public Cloud Infrastructure like GCP, Azure, and AWS.
Jan 7, 2019   |  By Netskope
Netskope's Tech Alliances Director, David Willis, walks us through the importance and benefits of Netskope's tech alliances ecosystem.
Dec 19, 2018   |  By Netskope
In this Netskope Smart Cloud Session we cover the top 3 ways Netskope can help you secure your Office 365 environment.