Cloud Security Blog

Announcing Skyhigh for Amazon Web Services

While the public cloud sector continues its rapid growth—as of 2016, it was estimated to be a $200 billion market—one...

By Santosh Raghuram | February 9, 2017

Announcing Skyhigh for Custom Applications

As the cloud market continues to expand, enterprises are not only accelerating their adoption of out-of-the-box SaaS services, they’re increasingly...

By Andy Oehler | February 8, 2017

CASB’s Next Frontier: Custom Apps + IaaS

Cloud represents the future of IT, as organizations across industries jettison their data centers. The widespread move has resulted in...

By Kamal Shah | February 7, 2017

CIO Corner: Enterprises Prepare for the IaaS Storm

Cloud Infrastructure-as-a-Service (IaaS) offerings have transformed how enterprises develop and deploy custom applications for their employees and customers. Development teams...

By Sam Bleiberg | February 2, 2017

Skyhigh Unveils Integration with Slack Enterprise Grid

The fast-moving collaboration space saw another significant development with the announcement of Slack Enterprise Grid, which allows companies to integrate...

By Gopi Boyinapalli | January 31, 2017

The Cloud Security Guide to RSA 2017

The RSA Conference provides a venue for information security professionals from across different backgrounds, countries, and industries to share their...

By Sam Bleiberg | January 27, 2017

IT Security Job Openings Hit One Million in 2017

At the beginning of 2016, the Cloud Security Alliance conducted a survey of IT security professionals that focused on, among...

By Ajmal Kohgadai | January 26, 2017

CISO Beat: New Year, New Infosec Challenges

IT security faces a crisis of confidence in 2017. Consumers’ awareness of companies’ cybersecurity capabilities has gone up as their...

By Sam Bleiberg | January 24, 2017

Alert Fatigue: 31.9% of IT Security Professionals Ignore Alerts

One of the challenges of modern threat protection solutions is the sheer number of alerts they generate. IT security teams...

By Ajmal Kohgadai | January 19, 2017

5 Attributes of an Effective Cloud Threat Protection Solution

Cloud security has come a long way over the last few years. Today, most enterprise cloud service providers (CSPs) take...

By Ajmal Kohgadai | January 12, 2017

CIO Corner: Cloud Security in the Era of the Data Breach

Now that the first one-billion-account data breach has arrived in the record books, it is safe to say the majority...

By Sam Bleiberg | January 9, 2017

6 Cloud Threat Protection Best Practices from the Trenches

As enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find that their existing threat protection...

By Ajmal Kohgadai | January 5, 2017

Report: 18.1% of all Files Uploaded to the Cloud Contain Sensitive data

In Skyhigh’s latest Cloud Adoption & Risk Report (download a free copy here) we analyzed the cloud usage of over...

By Cameron Coles | December 21, 2016

CISO Beat: Hazards of Emerging Technologies

Across the board, information security experts are predicting artificial intelligence, the Internet of Things (IoT), and cloud computing will make...

By Sam Bleiberg | December 20, 2016

Making a Case for a CASB – By the Numbers

The cloud access security broker (CASB) market is about to embark on its fifth year. Back in 2012, there were...

By Ajmal Kohgadai | December 12, 2016

CIO Corner: Is There a Right or Wrong Cloud Strategy?

Every company wants to put a cloud strategy in place. The question is whether the strategy will take advantage of...

By Sam Bleiberg | December 12, 2016

New eBook – Definitive Guide to Cloud Threat Protection

Data breaches continue to increase in frequency, severity, impact, and cost, as demonstrated by a 38% increase in known security...

By Ajmal Kohgadai | December 5, 2016

This Week in Cloud: Saudi Arabia, Muni, the Russian National Bank, and Zynga Are Victims

Hackers and cybercriminals are showing no signs of slowing down heading into the holidays. If anything, attacks are heating up....

By Sam Bleiberg | December 5, 2016

How to Build Your Personal Brand in IT Security

Building a brand as an innovative and effective cybersecurity leader is an essential step to unlocking one’s career potential. Security...

By Sam Bleiberg | December 2, 2016

CISO Beat: Insider Threat in the Cloud and the Path to the CISO’s Office

Google recently rebranded their cloud work tools as G Suite, incorporating Gmail and Google Drive. Companies are flocking to cloud...

By Sam Bleiberg | December 2, 2016