RECENT BLOGS

INDUSTRY PERSPECTIVE

Ask Me Anything: What are the top security issues that come with implementing a hybrid work schedule?

The hybrid workforce expansion has caused a shift in how organizations operate, and it’s safe to say that’s not changing. To support a business in borderless work environments, organizations have accelerated the migration of their applications and workloads to public clouds.

Read More

INDUSTRY PERSPECTIVES

Grand Theft Hacker: A Look at The Rockstar Games and Uber Hack

What does one of the most successful ride-sharing platforms and one of the world’s most popular games share in common?

Read More

INDUSTRY PERSPECTIVES

Join Skyhigh Security at Xpand Live 2022

This year at Xpand Live, we invite you to join us for three days of best practices, case studies, technical training, speaker panels, and product demonstrations, as we showcase how we go beyond data access and focus on data use.

Read More

INDUSTRY PERSPECTIVE

Ask Me Anything: How do you manage bandwidth issues with VPNs?

We’ve been in a time of rapid change in our IT environments as companies shifted within controlled networks to employees working from anywhere. Many found the architectures in place couldn’t accommodate the scalability and security challenges of a decentralized workforce.

Read More

INDUSTRY PERSPECTIVE

WhatsApp: Risky Service for Data Exfiltration

Today we access many legitimate personal cloud communication services, such as WhatsApp, for both work and personal purposes. However, sometimes those legitimate cloud services can be misused and lead to risk exposure of the corporate data.

Read More

THREAT RESEARCH

Takeaways from the Verizon Data Breach Investigations Report 2022

Verizon recently released their latest “Data Breach Investigations Report” (DBIR), offering highlights and notable insights into targeted industries, the evolving threat landscape, and which attack vectors garner the greatest impacts.

Read More

INDUSTRY PERSPECTIVE

ZTNA vs VPN – How to burst a Cyber Myth

I hear a lot of myths about what Zero Trust Network Access (ZTNA) is and how it compares to VPN. Some of it is true, and a lot of it is far from the truth. I decided to delve a bit deeper into the technology and do some myth bursting.

Read More

INDUSTRY PERSPECTIVE

Yet Another Big Name Falls Victim to Extortion Attack Involving Stolen Credentials

Hot on the heels of numerous high-profile breaches at the hands of cybercrime gangs, Cisco undoubtedly takes no pleasure in confirming a breach of its corporate network in a recent extortion attack from the Yanluowang ransomware group.

Read More

INDUSTRY PERSPECTIVE

Skyhigh Security Named a 2022 Peer Insights™ ‘Customers’ Choice’ for SSE

Headlines continue to report the shift workforces everywhere are turning to remote and hybrid options. With this new approach to work becoming the norm, organizations across all industries are seeking long-term solutions for securing data.

Read More

INTELLIGENCE DIGEST

Ransomware lives on – How your Office 365 could be at risk

Microsoft Office 365 is an indispensable business tool; widely used by organizations globally as they transition to the cloud. Unfortunately, it has also become a key attack vector nowadays..

Read More