Cloud Security Blog

Gartner Report: How to Enhance Office 365 Security

One of the primary reasons enterprises hesitate to migrate their on-premises IT deployments to the cloud is the concern surrounding...

By Ajmal Kohgadai | June 21, 2017

Latest Voter Data Leak Is a Lesson in AWS Security

Voter registration data breaches have come and gone without the public batting an eye in the past, but tensions around...

By Brandon Cook | June 20, 2017

New eBook – Top 7 Office 365 Use Cases for a CASB

As more enterprises adopt Office 365, new questions are arising about the security and compliance of corporate data. In moving...

By Cameron Coles | June 14, 2017

13 AWS IAM Best Practices for Security and Compliance

Amazon takes the security of its services and resources very seriously. One of the areas that Amazon has focused on...

By Ajmal Kohgadai | May 31, 2017

One Year Countdown to GDPR – Back to Basics

The clock is ticking. We have under one year until the greatest shakeup of data protection laws comes into force....

By Nigel Hawthorn | May 31, 2017

WannaCry Debacle: How You Can be Better Prepared for the Next Exploit

The last five days have been eventful in the cybersecurity space, with the ransomware WannaCry spreading like a ‘pandemic’ to...

By Brandon Cook | May 18, 2017

AstraZeneca Wins CSO50 Award for Security Project Using Skyhigh

AstraZeneca’s IT program breaks with the traditional mold of pharmaceutical companies by putting cloud at the heart of its collaboration...

By Mia Prickett | May 18, 2017

Top 10 Questions to Test Your GDPR Readiness

The GDPR (General Data Protection Regulation) will come into force in May 2018 covering any organization collecting or processing data...

By Nigel Hawthorn | May 18, 2017

5 Pitfalls to Avoid During a CASB Evaluation

In a recent research report, Gartner tagged enterprise spending on CASBs at $713 million, up from just $150.7 million in...

By Suhaas Kodagali | May 16, 2017

CIO Corner: War on Legacy IT

Chief Information Officers used to be subjected to derisive comments about their relevance. Cynics expanded the CIO acronym to “Career...

By Sam Bleiberg | May 11, 2017

AWS Shared Responsibility Model for Security and Compliance

As enterprises look to achieve greater operational efficiency and gain a competitive advantage, they are increasingly turning to cloud service...

By Ajmal Kohgadai | May 9, 2017

Google Docs Phishing Attack Reveals New Cloud-Native Threats

If you’ve received an email from a legitimate-looking email address in the past couple of days with a link to...

By Anand Ramanathan | May 5, 2017

Cloud Access Security Broker (CASB) Deployment Modes Best Practices

Many customers that deploy Cloud Access Security Broker (CASB) solutions to secure their shadow, sanctioned and custom IaaS apps very...

By Srini Gurrapu | May 1, 2017

Skyhigh Extends CASB to Workplace by Facebook

Workplace by Facebook and Skyhigh announced a partnership that will enable enterprises using Workplace to enforce security and compliance controls...

By Gopi Boyinapalli | April 18, 2017

CASB RFP Template: 180+ Common Questions Enterprises Are Asking

The cloud access security broker (CASB) market is set to take center stage in 2017 as the next business-critical security...

By Suhaas Kodagali | April 18, 2017

Every Company is a Software Company

The average enterprise has 464 custom applications deployed today. Across industries, even ones not associated with technology, companies of all...

By Cameron Coles | April 8, 2017

51 AWS Security Best Practices

In 2014, an attacker compromised Code Spaces’ Amazon Web Services (AWS) account used to deploy Code Spaces’ commercial code-hosting service....

By Ajmal Kohgadai | April 8, 2017

New eBook – Definitive Guide to AWS Security

While popular out-of-the-box SaaS products like Salesforce, Box, Dropbox, and Office 365 are becoming ubiquitous in the workplace, many enterprises...

By Ajmal Kohgadai | April 4, 2017

GDPR Myth: What happens in the EU must stay in the EU

If there’s one thing keeping governance, privacy, risk, and security folks awake at night it is the EU GDPR –...

By Nigel Hawthorn | April 4, 2017

6 Office 365 DLP Best Practices

Much has been written about the rapid pace at which enterprises are adopting Microsoft Office 365. Of equal significance is...

By Ajmal Kohgadai | March 30, 2017