You’ve seen the headlines about POODLE alongside images of menacing fluffy dogs. We have an update on the current extent of the breach as well as a tool enterprises can use to quantify exposure to POODLE within their own corporate environm…
Consumers and companies are embracing cloud services because they offer capabilities simply not available with traditional software. Cyber criminals are also beginning to use the cloud because it offers scalability and speed for delivering…
Between headlines from the latest stories on data breaches and the hottest new apps on the block, it’s easy to be captivated with what people are saying, blogging, and tweeting about the state of cloud adoption and security. But let’s face…
The European Union (EU) contains 28 countries and it has some of the strongest sets of data protection regulations in the world. These don’t just affect organisations based in Europe, but anyone who deals with PII (personally Identifiable …
Back in June we announced that Salesforce participated in Skyhigh’s Series C funding round as a strategic investor. The move validated our status as a category-creating company dedicated to addressing compliance and governance requirements…
A major vulnerability affecting the security of cloud services dubbed POODLE (Padding Oracle on Downgraded Legacy Encryption) was reported on October 14th by three Google security researchers—Bodo Moller, Thai Duong, and Krzysztof Kotowicz…
After the massive Target credit card breach and NSA revelations from Edward Snowden, corporate customers are taking a more careful eye toward the security of hosted data storage providers. “I think you’re seeing a greater emphasis on secur…
After suffering a 46% decline in quarterly profit in Q4 after a wide-reaching breach in which millions of customer credit cards were stolen, Target CEO Gregg Steinhafel resigned from the company Monday. Following the incident, investors ar…
Antivirus software has been a mainstay of computer security for well over two decades, but that era is coming to a close. Even major security software vendors are admitting that this new era demands new tools. “Antivirus is dead,” says Bri…
The firing of Target CEO Gregg Steinhafel this week underscored just how important computer security is to modern corporations. “I think it’s a clear sign that we’re in a new era, one in which companies are engaged in what you could clearl…
The role of the chief information, one of the newer additions to the c-suite, is undergoing a substantial transformation. “Ten years ago, the CIO was the chief buyer and builder of a massive internal network of technology. Now, you’re seei…
“We often get in quicker by the back door than the front” — Napoleon BonaparteA rare example of a backdoor planted in a core industry security standard has recently come to light. It is now widely believed that the NSA compromised trust in…
A recent report on SaaS Security highlighted a number of developments including that the average company in Europe is using 588 cloud services, almost as many as US companies which average 626 services. That shows that European employees a…
According to industry research from IDG, the companies want to adopt new cloud technology but are waiting until SaaS Security is more developed. That’s the situation US auto parts supplier Artes Electric is in. Their CIO Eric Atkins said a…
For Jeremy Lindhoff, one NSA powerpoint slide in a recent article based on materials released by whistleblower Edward Snowden caught his eye. “The diagram shows the NSA intercepting data between our datacenters, without approaching us with…
As the enterprise storage and collaboration company headed by precocious CEO Aaron Levie approaches, analysts are looking at evidence the company is ready to unseat enterprise software leaders like Microsoft and IBM. “One of the top questi…
Minimize the Risk of Data BreachesAlmost every week you hear of a high profile company that has suffered a security breach, exposing sensitive customer data. Data breaches can impact your organization’s reputation, lead to loss of business…
Knowledge workers know that cloud services make our work lives easier, drive business agility and increase productivity. For instance, when colleagues need to share a file that’s too large to attach to an email message, they simply toss it…
The benefits of the cloud are well publicized: reduced cost, faster time to market, and transitioning from Capex to Opexto name a few. But over the last 5 years, IT departments have been surprisingly slow to fully embrace the cloud. Their …
Encryption is fast becoming a must-have feature for data stored in the cloud. Between privacy concerns stemming from regulatory requirements and NSA surveillance, companies expect either cloud service providers or third-party vendors to en…
The cloud is growing exponentially and SaaS provider revenue in 2014 is set to surpass $18 billion, making the cloud application market larger than previous major shifts in technology at key points in their development including e-commerce…
It’s good to learn from your mistakes. It’s even better to learn from the mistakes of others. Skyhigh has some of the security world’s most seasoned data loss prevention (DLP) experts who’ve spent the last decade building DLP solutions and…
ServiceNow may have started as the help desk in the cloud, but today it covers a broad range of service experience, record keeping, process automation, and business management functions. Its portfolio includes applications related to your …
Enterprises are embracing content sharing and collaboration from Box to make their employees more productive and their businesses more nimble. The benefits are clear: employees can access their files and work from anywhere on any device. H…
Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds.Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the wid…
Security services have seen advances in identity and access management services; however, encryption services are lagging in the security industry. According to Gartner, revenues for identity and access management (IAM), remote vulnerabili…
Every year billions of dollars are lost due to financial fraud and digital fraud has become one of the target markets for fraudsters. The best weapon for today’s business environment is big data and analytics supporting a robust data loss …
Cloud service providers can make many promises regarding their data center’s physical security, but it is vital that you are able to understand the logical, remote and application dimensions to cloud security in that provider’s cloud stack…
Security in a cloud based computing environment is at the forefront of concerns for enterprises. Cyber security is a risk to any organization that relies heavily on data, and this is compounded by regulatory issues that organizations face.…
The utilization of cloud services for organizations presents a wide range of efficiencies, but there are many misunderstood requirements that are beginning to place new burdens on organizations. The customization, management and integratio…