Skyhigh Blog

Was the Cloud ShellShocked?

September 26th, 2014

Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds. Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the widely-used shell for Unix-based operating systems such as Linux and OS X. The bug allows the perpetrator…

Read More

The 7 Deadly Sins of Cloud Data Loss Prevention

September 22nd, 2014

It’s good to learn from your mistakes.  It’s even better to learn from the mistakes of others.  Skyhigh has some of the security world’s most seasoned data loss prevention (DLP) experts who’ve spent the last decade building DLP solutions and helping customers implement them.  So, we thought we’d pick their brains, uncover some of the…

Read More

Skyhigh Teams with Palo Alto Networks to Extend Next-Gen Firewall to the Cloud – and More

September 16th, 2014

As part of our mission to help organizations securely enable cloud services, we’ve expanded our range of partnerships beyond cloud service providers to include security solution providers. These strategic partnerships enable joint customers to leverage their investments in security infrastructure as they seek to securely enable cloud services. For this reason we are thrilled to…

Read More

Dyre Straits: Millions of Cloud Users Vulnerable to New Trojan

September 15th, 2014

A powerful new strain of malware called Dyre (or Dyreza) not only poses a serious threat to consumers and businesses, it also signifies the cloud has arrived. Dyre not only uses the cloud as a vector for distributing malware to client machines, once installed it attempts to compromise data sent to secured cloud services. Researchers…

Read More
Tags: | |

User-Centric Security, Compliance, and Governance for Box Customers

September 3rd, 2014

With BoxWorks 2014 growing into new digs at Moscone Center, Box has cemented its spot in the upper echelon of cloud service providers alongside names like Oracle, SalesForce, and ServiceNow. Box’s traction in the marketplace speaks volumes about the tremendous demand for global information sharing that is simple, fast, and effective. With the wealth of…

Read More

Meeting Data Governance Requirements with Collaboration Control for Box

September 3rd, 2014

Enterprises are embracing content sharing and collaboration from Box to make their employees more productive and their businesses more nimble. The benefits are clear: employees can access their files and work from anywhere on any device. However, that also means companies are storing a wide range of sensitive data in Box such as customer data,…

Read More

Cisco’s Path to Secure Cloud Enablement

August 29th, 2014

With a seemingly nonstop feed of menacing headlines announcing corporate data breaches, it is becoming impossible for IT departments to maintain a “head in the sand” attitude towards security vulnerabilities. “If you are the head of security, the first thing you’ve got to realize is that the bad news is not going to get better,”…

Read More

The Rapidly Emerging Security Market Called Cloud Access Security Broker (CASB), Cloud Application Control (CAC), and…

August 26th, 2014

When the founders of Skyhigh Networks started the company in 2012, they knew they were bringing to market an important service that would fill a major need for companies of all sizes. What they didn’t know at the time is that Skyhigh would be creating a new market category that Gartner would name the #1…

Read More
Tags:

The Fastest Growing Cloud Apps of 2014

August 25th, 2014

The cloud is growing exponentially and SaaS provider revenue in 2014 is set to surpass $18 billion, making the cloud application market larger than previous major shifts in technology at key points in their development including e-commerce revenue in 1998 ($8 billion) and personal computer revenue in 1982 ($11 billion). It’s easier today for entrepreneurs…

Read More
Tags:

Rise of the (Malware) Machines

August 22nd, 2014

Take any movie where robots rise up against their human makers, and you’ll see fear and panic set in.  This happens in films such as The Terminator (1984), Screamers (1995), and I, Robot (2004).  Why?  Because robots operate on autopilot and are not constrained by human limitations: the need for food, water, or sleep.  This…

Read More
Tags: | |