/Shannon Smith

About Shannon Smith

This author has not yet filled in any details.
So far Shannon Smith has created 51 blog entries.

Protecting Your Organization Against Privileged Attacks

In recent years, the threat of cyber attacks has grown steadily. Many large enterprises have suffered devastating attacks, despite having security resources in place. Why are so many falling prey to attacks? The answers are manifold, but one of the leading causes is the misuse and abuse of privileges, opening up an easy path for [...]

June 27th, 2018|Uncategorized|0 Comments

5 Tips for Using Adaptive Authentication Right

Adaptive Multi-factor Authentication is a powerful feature that adds flexibility to Multi-Factor Authentication (MFA). Depending on your login context – for example, I'm accessing the system from a country I never did before – the MFA authentication is required. In simple words: with Adaptive MFA, depending on your context, the MFA shows up (or not): [...]

June 13th, 2018|Uncategorized|0 Comments

Empower Identity-Driven Security by Automating Incident Response

Security attacks can happen in an instant. Nearly a third of people who receive a phishing email open it, according to Verizon’s Data Breach Investigations Report; and on average, these unsuspecting users click on its malicious link or attachment within a couple of minutes of receiving it. Just like that, in less than five minutes, your [...]

May 22nd, 2018|Uncategorized|0 Comments

Biometrics for Authentication: The Risks and Potential Rewards

In the last ten years, biometric technology has morphed from something Hollywood villains use to secure their secret dungeons to something almost everyone has in their pocket. But while adoption of biometric security has seen explosive success, misconceptions about biometric authentication are still very common. Let's take a look at how secure biometrics really are, [...]

May 2nd, 2018|Uncategorized|0 Comments

7 Azure Security Best Practices Everyone Must Follow

Infrastructure-as-a-Service (IaaS) adoption continues its upward trend as the fastest growing public cloud segment. Not surprisingly, in Microsoft’s latest Security Intelligence Report from 2017, cloud service users saw a 300% year-over-year increase in attacks against them, with over a third of attacks against Azure services in particular originating from China. With the rapid adoption of IaaS providers like [...]

April 20th, 2018|Uncategorized|0 Comments

IoT Security Concerns to Get Worse as IoT Adoption Increases

Gartner predicts that 20.8 billion internet-connected devices, also known as internet of things (IoT), will be in use worldwide by 2020. That is a 14.1 billion increase from 2016. This has the potential to drive an economic boost in the range of $4 trillion to $11trillion annually by 2025, according to  The McKinsey Global Institute. While [...]

February 20th, 2018|Uncategorized|0 Comments

Eight Security Capabilities You Need to Protect Your Amazon Web Services Infrastructure

The worldwide infrastructure as a service (IaaS) public cloud market grew 31 percent in 2016 to total $22.1 billion, up from $16.8 billion in 2015, and is expected to show the fastest growth over the next five years compared to platform as a service (PaaS) and software as a service (SaaS), according to Gartner. With increasing adoption of IaaS platforms, we also see [...]

January 29th, 2018|Uncategorized|0 Comments

What is a CASB (Cloud Access Security Broker)?

Cloud access security brokers (CASB) are on-premises or cloud-hosted software that sit between cloud service consumers and cloud service providers to enforce security, compliance, and governance policies for cloud applications. CASBs help organizations extend the security controls of their on-premises infrastructure to the cloud. What Is a CASB? from Skyhigh Networks on Vimeo. While some CASB [...]

January 7th, 2018|Uncategorized|0 Comments

Tokenization vs Encryption

Tokenization and encryption are often mentioned together as means to secure information when it’s being transmitted on the Internet or stored at rest. In addition to helping to meet your organization’s own data security policies, they can both help satisfy regulatory requirements such as those under PCI DSS, HIPAA-HITECH, GLBA, ITAR, and the EU GDPR. While tokenization and encryption are [...]

January 7th, 2018|Uncategorized|0 Comments

Cloud Computing Trends 2017

The transformative impact of cloud adoption Back in 2011, entrepreneur and investor Marc Andreessen wrote about how software impacts nearly all areas of modern life. The principal platform for software applications today is not a hard drive; it’s a web browser. Software delivered over the Internet, referred to as the cloud, is not just changing [...]

December 20th, 2017|Uncategorized|0 Comments