Skip to main content

Blogs

Latest Blogs

News thumbnail
Industry Perspectives

Focusing on the Right Persona

by Jim Beno · November 10, 2022

As a security company, the users of our product typically work in the Information Security (InfoSec) organization. But more and…

Read More
News thumbnail
Industry Perspectives

You Can’t Protect Data After a Breach

by Rodman Ramezanian · November 8, 2022

Data Protection must be an investment, not an expense. “Data is the new oil” is an increasingly popular refrain and…

Read More
News thumbnail
Industry Perspectives

BlueBleed Leak Proves Again, Not All Cloud Service Providers are Secure

by Thyaga Vasudevan · October 28, 2022

Dubbed “BlueBleed,” a recent Microsoft breach discovered by threat intelligence provider SOCRadar sheds light on the risks of misconfigured cloud storage buckets…

Read More
News thumbnail
Ask Me Anything

What are the Top Security Issues in a Hybrid Work Schedule?

by Scott Goree · October 27, 2022

Thanks for joining us for another topic in our Skyhigh Security “Ask Me Anything” series. Our audience selected “Top security…

Read More
News thumbnail
Industry Perspectives

Join Skyhigh Security at Xpand Live 2022

by Diana Massaro · September 22, 2022

Skyhigh Security is thrilled to be a Platinum Sponsor at Xpand Live 2022, coming up September 27-29 in Las Vegas. This…

Read More
News thumbnail
Industry Perspectives

Grand Theft Hacker: A Look at The Rockstar Games and Uber Hack

by Arnie Lopez · September 22, 2022

What does one of the most successful ride-sharing platforms and one of the world’s most popular video games share in…

Read More
News thumbnail
Ask Me Anything

How do you Manage Bandwidth Issues with VPNs?

by Thyaga Vasudevan · September 21, 2022

Welcome to our “Ask Me Anything” segment, where we invite our audience to submit security-related questions on LinkedIn or Twitter….

Read More
News thumbnail
Industry Perspectives

WhatsApp: Risky Service for Data Exfiltration

by Guermellou Mohammed · September 2, 2022

Today we access many legitimate personal cloud communication services, such as WhatsApp, for both work and personal purposes. However, sometimes…

Read More
News thumbnail
Threat Research

Takeaways from the 2022 Verizon Data Breach Investigations Report

by Rodman Ramezanian · August 26, 2022

As is annual tradition now, Verizon recently released their latest “Data Breach Investigations Report” (DBIR), offering highlights and notable insights…

Read More