Cloud Security Blog

CIO Corner: Cloud Security in the Era of the Data Breach

Now that the first one-billion-account data breach has arrived in the record books, it is safe to say the majority...

By Sam Bleiberg | January 9, 2017

6 Cloud Threat Protection Best Practices from the Trenches

As enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find that their existing threat protection...

By Ajmal Kohgadai | January 5, 2017

Report: 18.1% of all Files Uploaded to the Cloud Contain Sensitive data

In Skyhigh’s latest Cloud Adoption & Risk Report (download a free copy here) we analyzed the cloud usage of over...

By Cameron Coles | December 21, 2016

CISO Beat: Hazards of Emerging Technologies

Across the board, information security experts are predicting artificial intelligence, the Internet of Things (IoT), and cloud computing will make...

By Sam Bleiberg | December 20, 2016

Making a Case for a CASB – By the Numbers

The cloud access security broker (CASB) market is about to embark on its fifth year. Back in 2012, there were...

By Ajmal Kohgadai | December 12, 2016

CIO Corner: Is There a Right or Wrong Cloud Strategy?

Every company wants to put a cloud strategy in place. The question is whether the strategy will take advantage of...

By Sam Bleiberg | December 12, 2016

New eBook – Definitive Guide to Cloud Threat Protection

Data breaches continue to increase in frequency, severity, impact, and cost, as demonstrated by a 38% increase in known security...

By Ajmal Kohgadai | December 5, 2016

This Week in Cloud: Saudi Arabia, Muni, the Russian National Bank, and Zynga Are Victims

Hackers and cybercriminals are showing no signs of slowing down heading into the holidays. If anything, attacks are heating up....

By Sam Bleiberg | December 5, 2016

How to Build Your Personal Brand in IT Security

Building a brand as an innovative and effective cybersecurity leader is an essential step to unlocking one’s career potential. Security...

By Sam Bleiberg | December 2, 2016

CISO Beat: Insider Threat in the Cloud and the Path to the CISO’s Office

Google recently rebranded their cloud work tools as G Suite, incorporating Gmail and Google Drive. Companies are flocking to cloud...

By Sam Bleiberg | December 2, 2016

How Data Loss Prevention (DLP) Technology Works

Data loss prevention solutions are growing in popularity as enterprises look for ways to reduce the risk of sensitive data...

By Prasida Menon | December 2, 2016

New Case Study: How Maricopa County Secured its Cloud Usage with a CASB

Maricopa County is the largest county in the state of Arizona and the fourth largest in the United States. With...

By Mia Prickett | November 28, 2016

225 Information Technology (IT) Interview Questions

Whether you’re interviewing a candidate for an IT position, or you’re the candidate being interviewed, the face-to-face interview is still...

By Ajmal Kohgadai | November 28, 2016

9 Unexpected Findings from Skyhigh’s Latest Cloud Report

Last week, Skyhigh published its latest Cloud Adoption and Risk Report (download a free copy here). The report is based...

By Cameron Coles | November 22, 2016

Dropbox Announces Network Control Capability to Secure Enterprise Collaboration

Today, Dropbox announced its Network Control capability; an enhancement that enables IT teams to selectively limit access to unauthorized, personal...

By Andy Oehler | November 16, 2016

Adding Up the Full Cost of a Data Breach

Data breaches are happening all the time; often they hit the news for a short while then they are replaced...

By Nigel Hawthorn | November 16, 2016

Forrester Ranks CASB Vendors in Wave Report

In another sign of the cloud security market’s growing maturity, Forrester recently published its first Wave report on cloud security...

By Cameron Coles | November 15, 2016

What A Difference Three Years Makes

Think back three years ago and think forward to three years’ time – what were you doing then, what will...

By Nigel Hawthorn | November 14, 2016

Gartner’s Latest Report on the CASB Market

As enterprise adoption of cloud services and BYOD programs expand, enterprises are increasingly looking to cloud access security brokers (CASBs)...

By Cameron Coles | November 9, 2016

The 5 Most Common User Mistakes That Lead to Data Loss

Over the past several years, there have been numerous high-profile data breaches of cloud providers that have impacted millions of...

By Cameron Coles | November 1, 2016