RECENT BLOGS

CLOUD SECURITY

Achieving Precision with Data Protection using Skyhigh Security’s Unified Exact Data Matching

Research shows that modern day organizations invest more into protecting the most sensitive data from being exfiltrated into unsanctioned applications, users and devices.

Read More

INTELLIGENCE DIGEST

The Newest Abuse of File-Sharing Services Aids Phishing Campaigns

Today, threat actors leverage free cloud tools, such as hosting providers, file transfer services, collaboration platforms, calendar organizers, or a combination of each, to bypass security measures and disseminate malicious payloads around the world.

Read More

INDUSTRY PERSPECTIVE

Skyhigh Security Threat Predictions for 2023

Over the past 12 months, the style and severity of threats have continuously evolved. Despite fluctuations in their nature, there is much to be learnt from recent trends to help predict what might lie ahead in 2023.

Read More

INDUSTRY PERSPECTIVE

Focusing on the Right Persona

As a security company, the users of our product typically work in the Information Security (InfoSec) organization. But more and more, we're finding that our Security Service Edge (SSE) features are targeting users outside the security team.

Read More

INDUSTRY PERSPECTIVE

Ask Me Anything: What are the top security issues that come with implementing a hybrid work schedule?

The hybrid workforce expansion has caused a shift in how organizations operate, and it’s safe to say that’s not changing. To support a business in borderless work environments, organizations have accelerated the migration of their applications and workloads to public clouds.

Read More

INDUSTRY PERSPECTIVES

Grand Theft Hacker: A Look at The Rockstar Games and Uber Hack

What does one of the most successful ride-sharing platforms and one of the world’s most popular games share in common?

Read More

INDUSTRY PERSPECTIVES

Join Skyhigh Security at Xpand Live 2022

This year at Xpand Live, we invite you to join us for three days of best practices, case studies, technical training, speaker panels, and product demonstrations, as we showcase how we go beyond data access and focus on data use.

Read More

INDUSTRY PERSPECTIVE

Ask Me Anything: How do you manage bandwidth issues with VPNs?

We’ve been in a time of rapid change in our IT environments as companies shifted within controlled networks to employees working from anywhere. Many found the architectures in place couldn’t accommodate the scalability and security challenges of a decentralized workforce.

Read More

INDUSTRY PERSPECTIVE

WhatsApp: Risky Service for Data Exfiltration

Today we access many legitimate personal cloud communication services, such as WhatsApp, for both work and personal purposes. However, sometimes those legitimate cloud services can be misused and lead to risk exposure of the corporate data.

Read More

THREAT RESEARCH

Takeaways from the Verizon Data Breach Investigations Report 2022

Verizon recently released their latest “Data Breach Investigations Report” (DBIR), offering highlights and notable insights into targeted industries, the evolving threat landscape, and which attack vectors garner the greatest impacts.

Read More

INDUSTRY PERSPECTIVE

ZTNA vs VPN – How to burst a Cyber Myth

I hear a lot of myths about what Zero Trust Network Access (ZTNA) is and how it compares to VPN. Some of it is true, and a lot of it is far from the truth. I decided to delve a bit deeper into the technology and do some myth bursting.

Read More

INDUSTRY PERSPECTIVE

Yet Another Big Name Falls Victim to Extortion Attack Involving Stolen Credentials

Hot on the heels of numerous high-profile breaches at the hands of cybercrime gangs, Cisco undoubtedly takes no pleasure in confirming a breach of its corporate network in a recent extortion attack from the Yanluowang ransomware group.

Read More

INDUSTRY PERSPECTIVE

Skyhigh Security Named a 2022 Peer Insights™ ‘Customers’ Choice’ for SSE

Headlines continue to report the shift workforces everywhere are turning to remote and hybrid options. With this new approach to work becoming the norm, organizations across all industries are seeking long-term solutions for securing data.

Read More

INTELLIGENCE DIGEST

Ransomware lives on – How your Office 365 could be at risk

Microsoft Office 365 is an indispensable business tool; widely used by organizations globally as they transition to the cloud. Unfortunately, it has also become a key attack vector nowadays..

Read More