Skyhigh Blog

The Fastest Growing Cloud Apps of Q3 2014

October 29th, 2014

Up until just a few years ago, when it came to software you only had a couple choices. You’d either trek to the local retailer and pick from a box from the shelf, or in the case of enterprise software, you’d spend months trying to deploy it. There are exponentially more choices available today and…

Read More
Tags:

POODLE Update – Latest Data Alarms Experts

October 24th, 2014

You’ve seen the headlines about POODLE alongside images of menacing fluffy dogs. We have an update on the current extent of the breach as well as a tool enterprises can use to quantify exposure to POODLE within their own corporate environments. Last week, we wrote about the POODLE vulnerability first reported on October 14 by…

Read More
Tags:

In Plain Sight: How Hackers Exfiltrate Corporate Data Using Video

October 23rd, 2014

Consumers and companies are embracing cloud services because they offer capabilities simply not available with traditional software. Cyber criminals are also beginning to use the cloud because it offers scalability and speed for delivering malware, such as in the recent case of Dyre, which used file sharing services to infect users. The latest evolution of…

Read More

The Data Factory: 12 Essential Facts on Enterprise Cloud Usage & Risk

October 21st, 2014

Between headlines from the latest stories on data breaches and the hottest new apps on the block, it’s easy to be captivated with what people are saying, blogging, and tweeting about the state of cloud adoption and security. But let’s face it: It’s hard to separate the hype from the truth, and stories about security…

Read More

74% of Cloud Services do not Meet European Data Residency Requirements

October 21st, 2014

The European Union (EU) contains 28 countries and it has some of the strongest sets of data protection regulations in the world. These don’t just affect organisations based in Europe, but anyone who deals with PII (personally Identifiable Information) of any citizens of those 28 countries.  In this globalised world, that probably means you! Organisations which…

Read More
Tags:

POODLE – How bad is its bite? (Here’s the data)

October 15th, 2014

A major vulnerability affecting the security of cloud services dubbed POODLE (Padding Oracle on Downgraded Legacy Encryption) was reported on October 14th by three Google security researchers—Bodo Moller, Thai Duong, and Krzysztof Kotowicz. Their paper about the vulnerability is available here. What is POODLE? POODLE affects SSLv3 or version 3 of the Secure Sockets Layer protocol, which is…

Read More

Compliance, Governance, and Salesforce, Oh My!

October 13th, 2014

Back in June we announced that Salesforce participated in Skyhigh’s Series C funding round as a strategic investor. The move validated our status as a category-creating company dedicated to addressing compliance and governance requirements and boost the enterprise adoption of cloud services. Now we are thrilled to announce Skyhigh’s induction into Salesforce’s Independent Software Vendor…

Read More
Tags:

Skyhigh for ServiceNow at FruDevCon ’14: Security, Compliance, and Governance in the Cloud

October 7th, 2014

ServiceNow may have started as the help desk in the cloud, but today it covers a broad range of service experience, record keeping, process automation, and business management functions.  Its portfolio includes applications related to your infrastructure, your operations (such as IT incident tracking, sourcing and procurement, HR service automation), and your overall business (project…

Read More

A New Standard for Transparency in Encryption: Introducing Skyhigh’s Crypto Advisory Board

October 2nd, 2014

Encryption is fast becoming a must-have feature for data stored in the cloud. Between privacy concerns stemming from regulatory requirements and NSA surveillance, companies expect either cloud service providers or third-party vendors to enable encryption with customer-managed keys in SaaS applications. A key limitation of data encryption is that functionality and security occupy opposing axes….

Read More

Was the Cloud ShellShocked?

September 26th, 2014

Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds. Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the widely-used shell for Unix-based operating systems such as Linux and OS X. The bug allows the perpetrator…

Read More