Entries from 2014-01-01 to 1 year

POODLE Update – Latest Data Alarms Experts

You’ve seen the headlines about POODLE alongside images of menacing fluffy dogs. We have an update on the current extent of the breach as well as a tool enterprises can use to quantify exposure to POODLE within their own corporate environm…

In Plain Sight: How Hackers Exfiltrate Corporate Data Using Video

Consumers and companies are embracing cloud services because they offer capabilities simply not available with traditional software. Cyber criminals are also beginning to use the cloud because it offers scalability and speed for delivering…

The Data Factory: 12 Essential Facts on Enterprise Cloud Usage & Risk

Between headlines from the latest stories on data breaches and the hottest new apps on the block, it’s easy to be captivated with what people are saying, blogging, and tweeting about the state of cloud adoption and security. But let’s face…

74% of Cloud Services do not Meet European Data Residency Requirements

The European Union (EU) contains 28 countries and it has some of the strongest sets of data protection regulations in the world. These don’t just affect organisations based in Europe, but anyone who deals with PII (personally Identifiable …

Compliance, Governance, and Salesforce, Oh My!

Back in June we announced that Salesforce participated in Skyhigh’s Series C funding round as a strategic investor. The move validated our status as a category-creating company dedicated to addressing compliance and governance requirements…

POODLE – How bad is its bite? (Here’s the data)

A major vulnerability affecting the security of cloud services dubbed POODLE (Padding Oracle on Downgraded Legacy Encryption) was reported on October 14th by three Google security researchers—Bodo Moller, Thai Duong, and Krzysztof Kotowicz…

With Impending IPO, Box Security Under Scrutiny

After the massive Target credit card breach and NSA revelations from Edward Snowden, corporate customers are taking a more careful eye toward the security of hosted data storage providers. “I think you’re seeing a greater emphasis on secur…

Box Security in Spotlight

After suffering a 46% decline in quarterly profit in Q4 after a wide-reaching breach in which millions of customer credit cards were stolen, Target CEO Gregg Steinhafel resigned from the company Monday. Following the incident, investors ar…

Security Industry Pivots from Antivirus to Cloud Data Security

Antivirus software has been a mainstay of computer security for well over two decades, but that era is coming to a close. Even major security software vendors are admitting that this new era demands new tools. “Antivirus is dead,” says Bri…

SaaS Security Under Scrutiny After High Profile Breaches

The firing of Target CEO Gregg Steinhafel this week underscored just how important computer security is to modern corporations. “I think it’s a clear sign that we’re in a new era, one in which companies are engaged in what you could clearl…

Latest Addition to the CIO Job Description: Cloud Service Broker

The role of the chief information, one of the newer additions to the c-suite, is undergoing a substantial transformation. “Ten years ago, the CIO was the chief buyer and builder of a massive internal network of technology. Now, you’re seei…

Protecting Your Company from Backdoor Attacks – What You Need to Know

“We often get in quicker by the back door than the front” — Napoleon BonaparteA rare example of a backdoor planted in a core industry security standard has recently come to light. It is now widely believed that the NSA compromised trust in…

SaaS Security Highlighted in New Report

A recent report on SaaS Security highlighted a number of developments including that the average company in Europe is using 588 cloud services, almost as many as US companies which average 626 services. That shows that European employees a…

SaaS Security Final Piece Before Adoption Spreads

According to industry research from IDG, the companies want to adopt new cloud technology but are waiting until SaaS Security is more developed. That’s the situation US auto parts supplier Artes Electric is in. Their CIO Eric Atkins said a…

Cloud Encryption Frustrates Government Surveillance

For Jeremy Lindhoff, one NSA powerpoint slide in a recent article based on materials released by whistleblower Edward Snowden caught his eye. “The diagram shows the NSA intercepting data between our datacenters, without approaching us with…

Box Security in the Spotlight as Company Prepares for IPO

As the enterprise storage and collaboration company headed by precocious CEO Aaron Levie approaches, analysts are looking at evidence the company is ready to unseat enterprise software leaders like Microsoft and IBM. “One of the top questi…

Best Ways For Securing Your Data In Cloud

Minimize the Risk of Data BreachesAlmost every week you hear of a high profile company that has suffered a security breach, exposing sensitive customer data. Data breaches can impact your organization’s reputation, lead to loss of business…

A New Business Case for “Why IT Matters” in the Cloud Era

Knowledge workers know that cloud services make our work lives easier, drive business agility and increase productivity. For instance, when colleagues need to share a file that’s too large to attach to an email message, they simply toss it…

How to Secure Your Data in the Cloud

The benefits of the cloud are well publicized: reduced cost, faster time to market, and transitioning from Capex to Opexto name a few. But over the last 5 years, IT departments have been surprisingly slow to fully embrace the cloud. Their …

A New Standard for Transparency in Encryption: Introducing Skyhigh’s Crypto Advisory Board

Encryption is fast becoming a must-have feature for data stored in the cloud. Between privacy concerns stemming from regulatory requirements and NSA surveillance, companies expect either cloud service providers or third-party vendors to en…

The Fastest Growing Cloud Apps of 2014

The cloud is growing exponentially and SaaS provider revenue in 2014 is set to surpass $18 billion, making the cloud application market larger than previous major shifts in technology at key points in their development including e-commerce…

The 7 Deadly Sins of Cloud Data Loss Prevention

It’s good to learn from your mistakes. It’s even better to learn from the mistakes of others. Skyhigh has some of the security world’s most seasoned data loss prevention (DLP) experts who’ve spent the last decade building DLP solutions and…

Skyhigh for ServiceNow at FruDevCon ’14: Security, Compliance, and Governance in the Cloud

ServiceNow may have started as the help desk in the cloud, but today it covers a broad range of service experience, record keeping, process automation, and business management functions. Its portfolio includes applications related to your …

Meeting Data Governance Requirements with Collaboration Control for Box

Enterprises are embracing content sharing and collaboration from Box to make their employees more productive and their businesses more nimble. The benefits are clear: employees can access their files and work from anywhere on any device. H…

Was the Cloud ShellShocked?

Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds.Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the wid…

Cloud Security Vendors Poised for Growth

Security services have seen advances in identity and access management services; however, encryption services are lagging in the security industry. According to Gartner, revenues for identity and access management (IAM), remote vulnerabili…

Preventing Data Loss in a World of Industrialized Hacking

Every year billions of dollars are lost due to financial fraud and digital fraud has become one of the target markets for fraudsters. The best weapon for today’s business environment is big data and analytics supporting a robust data loss …

Cloud Security Requires a Multi-Layered Approach

Cloud service providers can make many promises regarding their data center’s physical security, but it is vital that you are able to understand the logical, remote and application dimensions to cloud security in that provider’s cloud stack…

Legal and Compliance Issues with Cloud Based Data Management

Security in a cloud based computing environment is at the forefront of concerns for enterprises. Cyber security is a risk to any organization that relies heavily on data, and this is compounded by regulatory issues that organizations face.…

Managed Application Service Providers with a Cloud Service Broker

The utilization of cloud services for organizations presents a wide range of efficiencies, but there are many misunderstood requirements that are beginning to place new burdens on organizations. The customization, management and integratio…