Cloud Security Blog

Skyhigh Discovers Super Sneaky Brute Force Attack on High-Value O365 Accounts

Companies today have to contend with cyberattackers who are using increasingly innovative ways to gain illicit access to corporate data....

By Sandeep Chandana | July 20, 2017

Two Easy Steps to Prevent AWS S3 Leaks like Verizon and Dow Jones’

Among all the reports of complex malware and 0-day vulnerabilities, it can be easy to forget that a few wrong...

By Slawomir Ligier | July 14, 2017

AWS vs Azure vs Google Cloud Market Share 2017

Overview of Cloud Market in 2017 and Beyond Industry analyst firm Gartner predicts that the infrastructure-as-a-service (IaaS) market will grow by 38.6%...

By Cameron Coles | July 13, 2017

Office 365 CASB Use Case #2: Prevent Storage of Regulated Data in the Cloud

Others posts in this series: Use case #1: managing external data sharing In a growing sign that enterprises trust Microsoft...

By Cameron Coles | July 10, 2017

Office 365 Security Use Case #1 for a CASB: Managing External Sharing

Formerly, when on-premises applications and email servers were the primary method of collaboration within and between enterprises, IT security organizations...

By Cameron Coles | June 29, 2017

Gartner CASB Magic Quadrant Update

Six years ago, when cloud security was in its nascent stage, Skyhigh was building what was to become the first...

By Ajmal Kohgadai | June 29, 2017

Gartner Report: How to Enhance Office 365 Security

One of the primary reasons enterprises hesitate to migrate their on-premises IT deployments to the cloud is the concern surrounding...

By Ajmal Kohgadai | June 21, 2017

Latest Voter Data Leak Is a Lesson in AWS Security

Voter registration data breaches have come and gone without the public batting an eye in the past, but tensions around...

By Brandon Cook | June 20, 2017

New eBook – Top 7 Office 365 Use Cases for a CASB

As more enterprises adopt Office 365, new questions are arising about the security and compliance of corporate data. In moving...

By Cameron Coles | June 14, 2017

13 AWS IAM Best Practices for Security and Compliance

Amazon takes the security of its services and resources very seriously. One of the areas that Amazon has focused on...

By Ajmal Kohgadai | May 31, 2017

One Year Countdown to GDPR – Back to Basics

The clock is ticking. We have under one year until the greatest shakeup of data protection laws comes into force....

By Nigel Hawthorn | May 31, 2017

WannaCry Debacle: How You Can be Better Prepared for the Next Exploit

The last five days have been eventful in the cybersecurity space, with the ransomware WannaCry spreading like a ‘pandemic’ to...

By Brandon Cook | May 18, 2017

AstraZeneca Wins CSO50 Award for Security Project Using Skyhigh

AstraZeneca’s IT program breaks with the traditional mold of pharmaceutical companies by putting cloud at the heart of its collaboration...

By Mia Prickett | May 18, 2017

Top 10 Questions to Test Your GDPR Readiness

The GDPR (General Data Protection Regulation) will come into force in May 2018 covering any organization collecting or processing data...

By Nigel Hawthorn | May 18, 2017

5 Pitfalls to Avoid During a CASB Evaluation

In a recent research report, Gartner tagged enterprise spending on CASBs at $713 million, up from just $150.7 million in...

By Suhaas Kodagali | May 16, 2017

CIO Corner: War on Legacy IT

Chief Information Officers used to be subjected to derisive comments about their relevance. Cynics expanded the CIO acronym to “Career...

By Sam Bleiberg | May 11, 2017

AWS Shared Responsibility Model for Security and Compliance

As enterprises look to achieve greater operational efficiency and gain a competitive advantage, they are increasingly turning to cloud service...

By Ajmal Kohgadai | May 9, 2017

Google Docs Phishing Attack Reveals New Cloud-Native Threats

If you’ve received an email from a legitimate-looking email address in the past couple of days with a link to...

By Anand Ramanathan | May 5, 2017

Cloud Access Security Broker (CASB) Deployment Modes Best Practices

Many customers that deploy Cloud Access Security Broker (CASB) solutions to secure their shadow, sanctioned and custom IaaS apps very...

By Srini Gurrapu | May 1, 2017

Skyhigh Extends CASB to Workplace by Facebook

Workplace by Facebook and Skyhigh announced a partnership that will enable enterprises using Workplace to enforce security and compliance controls...

By Gopi Boyinapalli | April 18, 2017