Skip to content

LogRhythm and Netskope Security Cloud

Netskope Security Cloud

As logs are ingested into the LogRhythm NextGen SIEM Platform, the Netskope SRP uses the Netskope RESTful API to add suspicious URLs, files, and SHA-256 hashes to Netskope’s blacklist. This can be performed from custom AI Engine rule sets or manually from the Web Console. The SRP also stores a local copy in the LogRhythm List Manager. If a threat feed indicates questionable browsing habits in LogRhythm, a security analyst can use the Netskope SRP to add the suspicious URL or file to the LogRhythm List and Netskope’s blacklist.

[pdf-embedder url=”https://advantage.nz/wp-content/uploads/2022/05/Netskope-JSB.pdf” title=”LogRhythm Automates Blacklisting of Suspicious URLs and Files”]

Facebook
Twitter
LinkedIn

Related Posts

We interviewed Brad Pearpoint about why Cyber Security is a core pillar of Advantage. He talks about the fact that security is a business-critical issue for businesses across all sectors and that every organisation, regardless of size, is facing growing pressures to protect data, ensure continuity of business and meet changing compliance requirements. He outlines how Advantage is responding to this issue with a client-first approach. 
Strong passwords are the first step to protecting your online accounts—but not all passwords are created equal. In this blog, we reveal why the seemingly complex “PE#5GZ29PTZMSE” isn’t as secure as you think, why a passphrase like “Stop Hammer Time!” wins, and how to check if your own credentials have already been exposed in breaches. Plus, we explore the next critical step in cybersecurity: enabling multi-factor authentication (MFA).
Never in all my life did I imagine I had that headline in me, and yet, here we are. With that acknowledgement aside, let’s get straight into it. Slopsquatting.