INTELLIGENCE DIGEST
2022 in Review: A Rapid Rise to Leadership in Security Service Edge
by Gee Rittenhouse · December 22, 2022
At its heart, security is a data protection problem. Security vendors recognize this and have responded by creating sophisticated point solutions to secure data wherever it resides. Unfortunately, today’s data is everywhere. This requires organizations to stitch these disparate technologies together to produce a comprehensive solution.
RECENT BLOGS
CLOUD SECURITY
Achieving Precision with Data Protection using Skyhigh Security’s Unified Exact Data Matching
by Hari Prasad Mariswamy · November 21, 2022
Research shows that modern day organizations invest more into protecting the most sensitive data from being exfiltrated into unsanctioned applications, users and devices.
INTELLIGENCE DIGEST
The Newest Abuse of File-Sharing Services Aids Phishing Campaigns
by Rodman Ramezanian · November 17, 2022
Today, threat actors leverage free cloud tools, such as hosting providers, file transfer services, collaboration platforms, calendar organizers, or a combination of each, to bypass security measures and disseminate malicious payloads around the world.
INDUSTRY PERSPECTIVE
Skyhigh Security Threat Predictions for 2023
by Rodman Ramezanian · November 16, 2022
Over the past 12 months, the style and severity of threats have continuously evolved. Despite fluctuations in their nature, there is much to be learnt from recent trends to help predict what might lie ahead in 2023.
INDUSTRY PERSPECTIVE
Focusing on the Right Persona
by Jim Beno · November 10, 2022
As a security company, the users of our product typically work in the Information Security (InfoSec) organization. But more and more, we're finding that our Security Service Edge (SSE) features are targeting users outside the security team.
INDUSTRY PERSPECTIVE
Ask Me Anything: What are the top security issues that come with implementing a hybrid work schedule?
by Scott Goree · October 27, 2022
The hybrid workforce expansion has caused a shift in how organizations operate, and it’s safe to say that’s not changing. To support a business in borderless work environments, organizations have accelerated the migration of their applications and workloads to public clouds.
INDUSTRY PERSPECTIVES
Grand Theft Hacker: A Look at The Rockstar Games and Uber Hack
by Arnie Lopez · September 22, 2022
What does one of the most successful ride-sharing platforms and one of the world’s most popular games share in common?
INDUSTRY PERSPECTIVES
Join Skyhigh Security at Xpand Live 2022
by Diana Massaro · September 22, 2022
This year at Xpand Live, we invite you to join us for three days of best practices, case studies, technical training, speaker panels, and product demonstrations, as we showcase how we go beyond data access and focus on data use.
INDUSTRY PERSPECTIVE
Ask Me Anything: How do you manage bandwidth issues with VPNs?
by Thyaga Vasudevan · September 21, 2022
We’ve been in a time of rapid change in our IT environments as companies shifted within controlled networks to employees working from anywhere. Many found the architectures in place couldn’t accommodate the scalability and security challenges of a decentralized workforce.
INDUSTRY PERSPECTIVE
WhatsApp: Risky Service for Data Exfiltration
by Guermellou Mohammed · September 2, 2022
Today we access many legitimate personal cloud communication services, such as WhatsApp, for both work and personal purposes. However, sometimes those legitimate cloud services can be misused and lead to risk exposure of the corporate data.
THREAT RESEARCH
Takeaways from the Verizon Data Breach Investigations Report 2022
by Rodman Ramezanian · August 26, 2022
Verizon recently released their latest “Data Breach Investigations Report” (DBIR), offering highlights and notable insights into targeted industries, the evolving threat landscape, and which attack vectors garner the greatest impacts.
INDUSTRY PERSPECTIVE
ZTNA vs VPN – How to burst a Cyber Myth
by Vishwas Manral · August 18, 2022
I hear a lot of myths about what Zero Trust Network Access (ZTNA) is and how it compares to VPN. Some of it is true, and a lot of it is far from the truth. I decided to delve a bit deeper into the technology and do some myth bursting.
INDUSTRY PERSPECTIVE
Yet Another Big Name Falls Victim to Extortion Attack Involving Stolen Credentials
by Rodman Ramezanian · August 15, 2022
Hot on the heels of numerous high-profile breaches at the hands of cybercrime gangs, Cisco undoubtedly takes no pleasure in confirming a breach of its corporate network in a recent extortion attack from the Yanluowang ransomware group.
INDUSTRY PERSPECTIVE
Skyhigh Security Named a 2022 Peer Insights™ ‘Customers’ Choice’ for SSE
by Anand Ramanathan · August 8, 2022
Headlines continue to report the shift workforces everywhere are turning to remote and hybrid options. With this new approach to work becoming the norm, organizations across all industries are seeking long-term solutions for securing data.
INTELLIGENCE DIGEST
Ransomware lives on – How your Office 365 could be at risk
by Rodman Ramezanian · August 3, 2022
Microsoft Office 365 is an indispensable business tool; widely used by organizations globally as they transition to the cloud. Unfortunately, it has also become a key attack vector nowadays..
RECENT NEWS
-
Dec 20, 2022
Skyhigh Security Achieves AWS Security Competency Status
-
Oct 18, 2022
Skyhigh Security Achieves United States Department of Defense Impact Level 5 Certification
-
Sep 27, 2022
Skyhigh Security Joins the Cloud Security Alliance
-
Aug 31, 2022
Skyhigh Security Appoints John N. Stewart as Executive Advisor
-
Aug 18, 2022
Skyhigh Security Bolsters Leadership Team; Appoints Scott Goree to Lead Worldwide Channel Organization