Ajmal Kohgadai

Product Marketing Manager

Gartner CASB Magic Quadrant Update

Six years ago, when cloud security was in its nascent stage, Skyhigh was building what...

By Ajmal Kohgadai | June 29, 2017

Gartner Report: How to Enhance Office 365 Security

One of the primary reasons enterprises hesitate to migrate their on-premises IT deployments to the...

By Ajmal Kohgadai | June 21, 2017

13 AWS IAM Best Practices for Security and Compliance

Amazon takes the security of its services and resources very seriously. One of the areas...

By Ajmal Kohgadai | May 31, 2017

AWS Shared Responsibility Model for Security and Compliance

As enterprises look to achieve greater operational efficiency and gain a competitive advantage, they are...

By Ajmal Kohgadai | May 9, 2017

51 AWS Security Best Practices

In 2014, an attacker compromised Code Spaces’ Amazon Web Services (AWS) account used to deploy...

By Ajmal Kohgadai | April 8, 2017

New eBook – Definitive Guide to AWS Security

While popular out-of-the-box SaaS products like Salesforce, Box, Dropbox, and Office 365 are becoming ubiquitous...

By Ajmal Kohgadai | April 4, 2017

6 Office 365 DLP Best Practices

Much has been written about the rapid pace at which enterprises are adopting Microsoft Office...

By Ajmal Kohgadai | March 30, 2017

6 Slack Security Best Practices

Since its launch in August of 2013, Slack has enjoyed remarkable growth in its user...

By Ajmal Kohgadai | March 27, 2017

12 Must-Know Statistics on Cloud Usage in the Enterprise

Over the past decade, the cloud has become a disruptive force affecting every function and...

By Ajmal Kohgadai | March 9, 2017

IT Security Certifications Salary Guide: CISM, CISSP, CISA, CompTIA, GSEC

For the second year in a row, there will be one million IT security job...

By Ajmal Kohgadai | February 22, 2017

IT Security Job Openings Hit One Million in 2017

At the beginning of 2016, the Cloud Security Alliance conducted a survey of IT security...

By Ajmal Kohgadai | January 26, 2017

Alert Fatigue: 31.9% of IT Security Professionals Ignore Alerts

One of the challenges of modern threat protection solutions is the sheer number of alerts...

By Ajmal Kohgadai | January 19, 2017

5 Attributes of an Effective Cloud Threat Protection Solution

Cloud security has come a long way over the last few years. Today, most enterprise...

By Ajmal Kohgadai | January 12, 2017

6 Cloud Threat Protection Best Practices from the Trenches

As enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find...

By Ajmal Kohgadai | January 5, 2017

Making a Case for a CASB – By the Numbers

The cloud access security broker (CASB) market is about to embark on its fifth year....

By Ajmal Kohgadai | December 12, 2016

New eBook – Definitive Guide to Cloud Threat Protection

Data breaches continue to increase in frequency, severity, impact, and cost, as demonstrated by a...

By Ajmal Kohgadai | December 5, 2016

225 Information Technology (IT) Interview Questions

Whether you’re interviewing a candidate for an IT position or a position in charge of...

By Ajmal Kohgadai | November 28, 2016

What’s Adaptive Authentication? How Does It Work?

While backdoor hacks and zero-day exploits remain a concern for enterprises who want to protect...

By Ajmal Kohgadai | October 31, 2016

Top 10 Cloud Collaboration Tools

Long before computers became ubiquitous, collaboration tools were an essential part of working in teams...

By Ajmal Kohgadai | October 19, 2016

Top Phishing Test Tools and Simulators

No matter how secure your network, applications, and endpoints, or whether you use security technologies...

By Ajmal Kohgadai | September 30, 2016