What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Netskope.webp 2023-03-08 07:00:00 Three Calls to Action for International Women\'s Day 2023 (lien direct) >In my career, I have seen many International Women's Day celebrations, and every year it gathers increasing attention in technology spheres. I'm grateful for the opportunity this attention brings to celebrate the accomplishments of women who are building representation and advocating for change in the tech industry. It's a time for women to come together, […] ★★
Netskope.webp 2023-03-07 23:01:18 Threat Labs News Roundup: February 2023 (lien direct) >Summary The purpose of the Netskope Threat Labs News Roundup series is to provide enterprise security teams an actionable brief on the top cybersecurity news from around the world. The brief includes summaries and links to the top news items spanning cloud-enabled threats, malware, and ransomware. Top Stories Three zero-days patched by Microsoft Microsoft released […] Threat ★★★
Netskope.webp 2023-03-03 16:00:00 Cloud Threats Memo: Multiple Different Cloud Apps Abused in a Single Cyber Espionage Campaign (lien direct) >Threat actors continue to exploit cloud services for cyber espionage, and a new campaign by a threat cluster named WIP26, discovered recently by researchers at Sentinel One in collaboration with QGroup, targeting telecommunication providers in the Middle East, confirms this trend.  In particular what makes this campaign stand out is the abuse of multiple cloud […] Threat Cloud ★★★
Netskope.webp 2023-03-02 16:00:00 I Have Seen Success as a Security Marketing Leader in the EMEA and LATAM Regions. Here\'s Why I Joined Netskope. (lien direct) >I wasn't looking for a job when I first started talking to Netskope about the role of VP of EMEA and LATAM Marketing. But after many talks with Sanjay Beri, Jason Clark and Raphael Bousquet, what drove me to join was a mix of Netskope's talent, technology, and potential in the industry. It’s a bit […] ★★
Netskope.webp 2023-03-01 07:00:00 Why Organisations Must Get to Grips With Cloud Delivered Malware (lien direct) >Netskope has just published the Monthly Threat Report for February, with this month's report focused on what is going on in  Europe. I don't intend to summarise the report in this blog, instead I want to zoom in and  study a continuing trend that was highlighted in there; one that is unfortunately heading in the […] Malware Threat Prediction Cloud ★★★
Netskope.webp 2023-02-28 20:17:02 Borderless SD-WAN: Ushering in the New Era of Borderless Enterprise (lien direct) >Let's face it, your remote connectivity architecture isn't going to cut it for much longer. Maybe you struggle with providing uniform secure optimized access, or with a patchwork of multi-vendor policies, or with network blind spots across all remote users, devices, sites, and clouds. One or all of these issues can lead to a situation […] Guideline ★★
Netskope.webp 2023-02-27 16:08:32 Strengthening Defenses Against Advanced Cloud and Email Threats with Netskope and Mimecast (lien direct) >The widespread adoption of cloud transformation and hybrid work are increasing the attack surface while attacks get increasingly sophisticated. Attacks targeting cloud infrastructure and email-borne threats have soared to unprecedented levels, making it critical for organizations to protect sensitive data regardless of where it may be stored. Traditional security architectures were not designed to protect […] Cloud ★★
Netskope.webp 2023-02-24 16:00:26 Lessons Learned From a Year of Russo-Ukrainian Cyberwar (lien direct) >February 24, 2023 marks one year since Russia invaded Ukraine, starting a conflict that has killed more than 8,000, injured more than 13,300, and displaced more than 14 million people in the past year, according to the UN. Physical warfare between Ukraine and Russia has been accompanied by cyberwarfare between the two countries. This blog […] ★★
Netskope.webp 2023-02-22 07:00:00 View from the Frontlines: Real-time User Coaching (lien direct) >I had the pleasure of spending some time with our Australian and New Zealand teams this month, and throughout my trip I heard over and over again that one of the most beloved and differentiating things within the Netskope platform is the facility for user coaching. It's actually something I hear from teams around the […] ★★★
Netskope.webp 2023-02-21 16:35:05 Netskope Threat Labs Stats for January 2023 (lien direct) >Starting with January 2023, Netskope Threat Labs will publish a monthly summary blog post of the top threats we are tracking on the Netskope Security Cloud platform. The purpose of this post is to provide strategic, actionable intelligence on active threats against enterprise users worldwide. Summary Attackers continue to attempt to fly under the radar […] Threat ★★★
Netskope.webp 2023-02-16 20:01:35 Netskope Cloud Threats Memo: Learnings From the Hi-Tech Crime Trends 2022/2023 (lien direct) >The underground economy of the initial access brokers (IABs) is more flourishing than ever. At least this is one of the conclusions of the recent report “Hi-Tech Crime Trends 2022/2023” released by Group-IB. Initial access brokers exploit vulnerabilities or misconfigurations to get hold of valid access credentials (typically VPN or RDP) and outsource or sell […] ★★
Netskope.webp 2023-02-16 16:01:26 Threat Labs News Roundup: January 2023 (lien direct) >Summary The purpose of the Netskope Threat Labs “Cybersecurity News Roundup” series is to provide enterprise security teams an actionable brief on the top cybersecurity news from around the world. The brief includes summaries and links to the top news items spanning cloud-enabled threats, malware, and ransomware. Top Stories Attackers using SEO poisoning to deliver […] Threat ★★
Netskope.webp 2023-02-15 14:00:00 Big Trends From the 2023 Okta Business at Work Report (lien direct) >This year's Okta Business at Work annual report highlights growth, despite national headlines with concerns about a recession and economic contraction. Given Okta's role as a leading identity service provider, the growth theme is good news for stronger authentication and protection against access compromise, phishing, and ransomware. The theme around growth also highlights the undercurrent […] Guideline ★★
Netskope.webp 2023-02-15 07:00:00 5G and SASE: A Match Made in Heaven (lien direct) >I recently attended the LEAP tech event in Saudi Arabia, and it was clear walking the trade show floor that 5G is hitting critical mass. Lightning-fast network connections are now rolling into cities across Saudi Arabia and the wider world, and while it's true that some countries are further into the rollout of 5G than […] ★★
Netskope.webp 2023-02-08 07:00:00 The UK\'s NCSC Cyber Essentials Zero Trust Update: Explained (lien direct) >Late in January this year, the UK's National Cyber Security Centre announced an update to its Cyber Essentials scheme in order to ensure it “continues to help UK organisations guard against the most common cyber threats”. This year's update isn't an overhaul on the same scale as last year's, but it did include important new […] ★★★
Netskope.webp 2023-02-07 14:52:42 The 3 Major Shortcomings of Traditional DLP (lien direct) >As digital transformation continues to blossom and cloud adoption increases, we continue to see challenges crop up when it comes to traditional DLP solutions.  Setting aside the architectural and operational complexity and high cost that comes with traditional DLP, practitioners recognize that existing tools aren't able to keep up. In fact, modern hybrid work business […] ★★★
Netskope.webp 2023-02-02 15:18:20 Cloud Threats Memo: Understanding the Growing Risk of Consent Phishing (lien direct) >The advent of cloud applications led to a new generation of phishing attacks (named OAuth phishing or consent phishing) where, rather than stealing the user credentials,  threat actors aim to obtain an authorization token via a rogue cloud app that allows them to perform harmful activities on the victim's cloud environment. These activities include: reading […] Threat ★★★★
Netskope.webp 2023-02-01 07:00:00 The Environment as an Imperative (lien direct) >About 15 months ago we made a prediction. “COP26 has been the most urgent we have seen yet, with governments, businesses, and individuals all hearing and responding to scientists' calls for expedient action to protect our ways of life. We will see this imperative running through RFPs and procurement choices in 2022, and I predict […] Prediction ★★
Netskope.webp 2023-01-31 19:54:12 An Overview of the Netskope AWS CloudTrail Lake Integration (lien direct) >Following the recent AWS CloudTrail Lake announcement, this blog will guide you through how to configure a Netskope Cloud Exchange instance to send Netskope user access logs to AWS CloudTrail Lake using the Cloud Log Shipper (CLS) module and the CLS plugin developed for CloudTrail Lake. Cloud Exchange (deployed in Amazon ECS on Fargate) can […] ★★
Netskope.webp 2023-01-27 18:26:29 5 Tips To Keep in Mind for Data Privacy Day (lien direct) >No matter what industry you're in, data privacy is an issue that impacts you. And when it comes to being safe online with sensitive data, whether that's your personal data or sensitive data that is important to your organization, being informed is the first step.  With that in mind, ahead of Data Privacy Day on […] Studies ★★★
Netskope.webp 2023-01-26 17:08:48 NewEdge is a SASE-ready Infrastructure that is Second to None (lien direct) >Cloud security, let alone SASE, doesn't work without the underlying infrastructure that provides a consistent “baseload” to deliver the security capabilities integral to protecting users, sites, apps, and most importantly the data. This is more important than ever with security a board-level priority and organizations confronted with an ever-growing number of risks, ranging from the […] ★★
Netskope.webp 2023-01-25 15:00:00 The Best Strategies for Security and Technology Leaders Managing in a Hybrid Work World (lien direct) >It should come as no surprise to anyone who has lived through the last three years that the way we work has changed drastically. The onset of the COVID-19 pandemic forced organizations to figure out how to better enable their employees to work from home securely and easily. The result was an acceleration of trends […] ★★
Netskope.webp 2023-01-25 07:00:00 The Security Implications of A Digital Twin (lien direct) >Digital twins are digital replicas of physical assets, processes, and systems, and they are used to perform simulations and analysis to optimise the real-world performance of those assets, processes, or systems. They have become increasingly popular in many industries, including manufacturing, healthcare, and transportation. However, as digital twins become more prevalent, it is important to […] ★★
Netskope.webp 2023-01-20 15:00:00 ChatGPT: Dispelling FUD, Driving Awareness About Real Threats (lien direct) >Summary ChatGPT is an artificial intelligence chatbot created by OpenAI, reaching 1 million users at the end of 2022. It is able to generate fluent responses given specific inputs. It is a variant of the GPT (Generative Pre-trained Transformer) model and, according to OpenAI, it was trained by mixing Reinforcement Learning from Human Feedback (RLHF) […] ChatGPT ★★★
Netskope.webp 2023-01-19 19:57:37 Cloud Threats Memo: Threat Actors Continue to Abuse Cloud Services to Deliver Malware in 2023 (lien direct) >Our most recent Cloud and Threat Report highlighted how threat actors abuse cloud services (with a special focus on cloud storage apps) to deliver malicious content (and yes, OneDrive leads the chart of the most exploited apps). To confirm that this trend will likely continue in 2023, researchers at Trend Micro have discovered an active […] Malware Threat Guideline Prediction ★★★
Netskope.webp 2023-01-18 07:00:00 The Impact of AI on Cybersecurity: Balancing the Risks and Opportunities (lien direct) >As artificial intelligence (AI) advances, I am seeing a lot of discussion on LinkedIn and in the online media about the advantages it may bring for either the threat actors (“batten down the hatches, we are all doomed”) or the security defence teams (“it’s OK, relax, AI has you covered”). It has occurred to me […] Threat ★★★
Netskope.webp 2023-01-11 07:00:00 Myth Busting: Why Moving From VPN to ZTNA Doesn\'t Have to be a Heavy Lift (lien direct) >Over the last few years many organizations have already introduced a zero trust network access (ZTNA) solution, and are seeing the benefits from it. But many others have been put off by the work needed to transition to a zero trust-based access model and the associated technical integration work. In this blog I will unpack […] ★★★
Netskope.webp 2023-01-10 21:44:13 Understanding Evolving Insider Risks in a Hybrid World (lien direct) >Insider risks are threats that already have access to an organization's sensitive information. They are people who have physical access to the organization's buildings and credentials to sign-on to the network. But maybe more importantly, they're familiar with the organization's processes, they speak the company lingo, and they know where the important assets reside. Whether […] ★★★
Netskope.webp 2023-01-05 16:35:50 I\'m a Technology Leader Who Sees Opportunities for Accelerating Security Transformation Through Networking and Infrastructure. Here\'s Why I Joined Netskope. (lien direct) >Right now, I see a great opportunity in the cybersecurity industry to help customers as they navigate through security transformation. I don't come from a traditional security background; I'm what we might call a “networking guy.” But about two and a half years ago, in my previous role at Dell, I started noticing a trend […] Prediction
Netskope.webp 2023-01-04 15:00:00 Four Resolutions for Security Leaders to Keep in Mind for 2023 (lien direct) >Starting off a new year often comes with a re-energized sense of taking stock of big changes you want to make and how you want to accomplish them. And, as we come off of “prediction season”, there's also a sense of the hot topics and challenges that are already on the horizon for the security […] ★★★
Netskope.webp 2023-01-04 07:00:00 Data Insights for Parenting…and Cybersecurity Teams (lien direct) I am often struck by the similarities in the skill set required for both parenting and cybersecurity. With children-as with employees-it is much easier to keep everyone safe if you have a little bit of visibility into what's actually going on. The hardest child to parent effectively is one who shuts themselves away in their […] ★★
Netskope.webp 2022-12-29 17:00:00 A Closer Look at Hybrid Work Environments and Cyber Insurance Coverage (lien direct) >Organizations seeking cyber insurance coverage are typically required by their insurer to provide evidence of a panoply of controls around information security, disaster recovery, and related risk and technology requirements and best practices.   When organizational data resides only on-premises, documenting, evaluating and maintaining these controls have their challenges but are fairly straightforward for the IT, […] ★★
Netskope.webp 2022-12-27 15:29:48 (Déjà vu) 3 Key Use Cases Along the SASE & Zero Trust Journey (lien direct) In the first part of this blog series, I took a look at how an understanding of digital strategy and digital risk is key to starting a security transformation journey. And in the second, I dug further into how a secure access service edge (SASE) architecture with security service edge (SSE) capabilities and zero trust […] ★★
Netskope.webp 2022-12-22 15:15:08 Data Protection is Finally a Barbecue Conversation for Ordinary Australians. (lien direct) >Co-authored by David Fairman and Netskope CXO Advisors Samm MacLeod and Nicholas McKenzie Cyber incidents are becoming increasingly common and disruptive–whether it’s ransomware, data breaches, or leaks. The number of compelling events in the last few months in Australia have shown us the implications for businesses, and their customers, when a breach occurs. There has […] ★★
Netskope.webp 2022-12-21 07:00:00 The Three Why\'s of Vendor Consolidation (lien direct) >Consolidating vendors has always been on the mind of digital leaders, but the current economic climate has elevated this topic, with a recent Gartner survey claiming that 75% of organisations are currently pursuing security vendor consolidation projects, up from 29% in 2020.  On the face of it, we can put this down to the need […] Guideline ★★★
Netskope.webp 2022-12-20 15:00:00 Big Trends and Hot Topics From H-ISAC 2022 (lien direct) >Last week, I had the opportunity to attend and speak at the H-ISAC fall summit here in Phoenix. As always, this conference is a great opportunity to meet back up with customers and friends from all around the Healthcare sector. This leads to illuminating conversations that really give me a higher definition picture of what […] Guideline ★★
Netskope.webp 2022-12-19 21:02:20 Cloud Threats Memo: State-sponsored Threat Actors Continue to Abuse Legitimate Cloud Services (lien direct) >Threat actors exploiting cloud services are keeping me very busy in these final days of this troubled 2022. The main character of this Cloud Threats Memo is MuddyWater (also known as Earth Vetala, MERCURY, Static Kitten, Seedworm, and TEMP.Zagros), one of the most prolific cyber espionage groups, active since at least 2017, and believed to […] Threat ★★★★
Netskope.webp 2022-12-15 15:07:31 Netskope Client: Enabling a Secure Borderless Workforce (lien direct) >In order to enable and sustain an effective and secure hybrid work environment, enterprises need security that can deliver protection anywhere, stop modern threats, ensure compliance, and maintain consistent policies across both on-premise and remote locations.  The expansion of the attack surface that came with remote work and the increasing use of public cloud were […]
Netskope.webp 2022-12-14 07:00:00 A Quantum Arms Race in Cybersecurity (lien direct) >In 2001, NIST (the US National Institute of Standards and Technology) announced Advanced Encryption Standard (AES), a new encryption standard, designed to help organisations enhance protections against brute force attacks. The previous Data Encryption Standard (DES) had become vulnerable, with processing power growing, and the Electronic Frontier Foundation (EFF) had proved that DES encryption could […] ★★★
Netskope.webp 2022-12-13 22:16:36 Cloud Threats Memo: Understanding the Dead Drop Resolver Technique (lien direct) >If I asked you what the common ways to exploit a cloud app for malicious purposes are, I bet your answer would probably be either to use it to distribute malicious content (such as malware or phishing pages), or to host the command and control (C2) infrastructure. In reality another frequent technique is the dead […] Malware ★★★★
Netskope.webp 2022-12-13 12:45:00 How Netskope Cloud Exchange as a Managed Service Can Help Improve Your Security Posture (lien direct) >Starting January 1, 2023, Netskope will offer customers Cloud Exchange (CE), its industry leading integration platform, as a managed service. This managed service will enable a much larger customer base to benefit from CE, including customers lacking in-house resources or preferring to consume CE as a managed service. The new managed service delivers CE as […] Guideline ★★
Netskope.webp 2022-12-07 07:00:00 Implementation Insights: What We Learned From Keeping French Students Secure (lien direct) >Sometimes in the comms team here at Netskope I hear fantastic tales that are not yet approved for public consumption. The frustration is very real when I hear of a creative customer implementation that cannot yet be told to the wider world. But today I have contrived a clever way to be able to share […] ★★
Netskope.webp 2022-12-06 19:07:40 Cloud Threats Memo: Cyber Espionage Exploiting Google Drive for C2 Infrastructure (lien direct) >Another day, another legitimate cloud service exploited for a cyber espionage campaign… Researchers at ESET recently discovered Dolphin, a previously unreported backdoor used by the North-Korean threat actor APT37 (AKA ScarCruft and Reaper) against selected targets. The backdoor, deployed after the initial compromise using less sophisticated malware, was observed for the first time in early […] Threat Cloud APT 37 ★★★
Netskope.webp 2022-12-06 16:14:25 Managing Risks with SASE, SSE, and Zero Trust (lien direct) >In the first part of this blog series, I took a look at how an understanding of digital strategy and digital risk is key to starting a security transformation journey. In this post, I am digging further into how a secure access service edge (SASE) architecture with security service edge (SSE) capabilities and zero trust […] ★★
Netskope.webp 2022-12-01 15:54:45 Important Takeaways from the Orange and Netskope Partnership (lien direct) >Recently, Orange Business Services, Orange Cyberdefense, and Netskope announced a global partnership to deliver a fully integrated secure access service edge (SASE) solution on the Orange network. The partnership includes the deployment of Netskope data planes inside the Orange network to provide a full stack of security service edge (SSE) services that will be available […] ★★★
Netskope.webp 2022-11-30 19:09:46 Cloud Threats Memo: Yet Another Cyber Espionage Campaign Exploiting Cloud Services (lien direct) >In the latest example of a cloud service being exploited for cyber espionage, researchers from Trend Micro have shed light on a campaign, conducted between March and October 2022, targeting government, academic, foundations, and research sectors of multiple countries including Myanmar, Australia, the Philippines, Japan, and Taiwan. The campaign has been attributed to a notorious […] ★★★
Netskope.webp 2022-11-30 15:39:00 How Graph-powered SSPM Adds the Right Context (lien direct) >SaaS apps have become the “easy button” for organizations seeking a fast and simple way to make foundational business apps available to their employees. According to Gartner, “SaaS remains the largest public cloud services market segment, forecasted to reach $176.6 billion in end-user spending in 2022,” growing 14% over 2021. And according to research by […] ★★★
Netskope.webp 2022-11-30 07:00:00 Digital Strategies For A Fast Approaching Future (lien direct) >The future is arriving faster than you think.  By 2030, fully automated vehicles are expected to account for 12% of global vehicle sales-a number that hikes to 20% for new vehicle sales in China. Tomorrow, 1st December, the first electric, semi-autonomous lorries with a range of 500 miles roll off the Tesla production line – […] ★★★
Netskope.webp 2022-11-29 15:32:38 Test Drive Netskope Private Access: A Modern ZTNA Solution (lien direct) >We are pleased to announce that Netskope Private Access (NPA) is now available to test drive, meaning you can experience a truly modern zero trust network access (ZTNA) solution firsthand with no commitment and no software to download or install.  Selecting and implementing the right ZTNA solution is a crucial part of the SASE journey, […] ★★
Netskope.webp 2022-11-23 15:54:40 Detecting Ransomware Using Machine Learning (lien direct) >Co-authored by Yihua Liao, Ari Azarafrooz, and Yi Zhang Ransomware attacks are on the rise. Many organizations have fallen victim to ransomware attacks. While there are different forms of ransomware, it typically involves the attacker breaching an organization's network, encrypting a large amount of the organization's files, which usually contain sensitive information, exfiltrating the encrypted […] Ransomware
Last update at: 2024-06-23 02:10:26
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter