Cloud Security Blog

CIO Corner: War on Legacy IT

Chief Information Officers used to be subjected to derisive comments about their relevance. Cynics expanded the CIO acronym to “Career...

By Sam Bleiberg | May 11, 2017

AWS Shared Responsibility Model for Security and Compliance

As enterprises look to achieve greater operational efficiency and gain a competitive advantage, they are increasingly turning to cloud service...

By Ajmal Kohgadai | May 9, 2017

Google Docs Phishing Attack Reveals New Cloud-Native Threats

If you’ve received an email from a legitimate-looking email address in the past couple of days with a link to...

By Anand Ramanathan | May 5, 2017

Cloud Access Security Broker (CASB) Deployment Modes Best Practices

Many customers that deploy Cloud Access Security Broker (CASB) solutions to secure their shadow, sanctioned and custom IaaS apps very...

By Srini Gurrapu | May 1, 2017

Skyhigh Extends CASB to Workplace by Facebook

Workplace by Facebook and Skyhigh announced a partnership that will enable enterprises using Workplace to enforce security and compliance controls...

By Gopi Boyinapalli | April 18, 2017

CASB RFP Template: 180+ Common Questions Enterprises Are Asking

The cloud access security broker (CASB) market is set to take center stage in 2017 as the next business-critical security...

By Suhaas Kodagali | April 18, 2017

Every Company is a Software Company

The average enterprise has 464 custom applications deployed today. Across industries, even ones not associated with technology, companies of all...

By Cameron Coles | April 8, 2017

51 AWS Security Best Practices

In 2014, an attacker compromised Code Spaces’ Amazon Web Services (AWS) account used to deploy Code Spaces’ commercial code-hosting service....

By Ajmal Kohgadai | April 8, 2017

New eBook – Definitive Guide to AWS Security

While popular out-of-the-box SaaS products like Salesforce, Box, Dropbox, and Office 365 are becoming ubiquitous in the workplace, many enterprises...

By Ajmal Kohgadai | April 4, 2017

GDPR Myth: What happens in the EU must stay in the EU

If there’s one thing keeping governance, privacy, risk, and security folks awake at night it is the EU GDPR –...

By Nigel Hawthorn | April 4, 2017

6 Office 365 DLP Best Practices Everyone Must Follow

Much has been written about the rapid pace at which enterprises are adopting Microsoft Office 365. Of equal significance is...

By Ajmal Kohgadai | March 30, 2017

CISO Beat: Designing a Better Security Organization

Regulators and security practitioners alike are engaged in an effort to realign economic incentives that seemingly put enterprises at a...

By Sam Bleiberg | March 30, 2017

CIO Corner: The True Cost of a Data Breach

Business executives know that their organizations need to invest in cybersecurity, but it is notoriously difficult to estimate the cost...

By Sam Bleiberg | March 30, 2017

6 Slack Security Best Practices

Since its launch in August of 2013, Slack has enjoyed remarkable growth in its user base. As of 2016, Slack...

By Ajmal Kohgadai | March 27, 2017

The Global Case for Data Protection

Do you have colleagues who see data protection regulations as a chore? Something to ignore as long as possible and...

By Nigel Hawthorn | March 21, 2017

Skyhigh Leads CASB Innovation with 7th and 8th Patents

Skyhigh recently extended its lead in the cloud security innovation race with the issuance of two seminal new patents covering...

By Sekhar Sarukkai | March 16, 2017

CISO Beat: Delivering Secure Products

The phrase “digital transformation” has served as a catch-all in the IT industry for the shift in how companies use...

By Sam Bleiberg | March 9, 2017

12 Must-Know Statistics on Cloud Usage in the Enterprise

Over the past decade, the cloud has become a disruptive force affecting every function and initiative in the enterprise. Gartner...

By Ajmal Kohgadai | March 9, 2017

Google-Uber Lawsuit: A Wake-up Call for Enterprises on Insider Threats

Waymo, an Alphabet entity that was previously Google’s self-driving car project, has recently filed a lawsuit against Otto, the self-driving...

By Suhaas Kodagali | March 8, 2017

Cloudbleed Technical Analysis

When Tavis Ormandy from Google’s corpus distillation project started analyzing data from publically available databases on Feb 17th 2017, little...

By Rama Taraniganty | March 3, 2017