Uncategorized

/Uncategorized

Every Company is a Software Company

The average enterprise has 464 custom applications deployed today. Across industries, even ones not associated with technology, companies of all sizes are developing applications that help them engage with customers, suppliers, and employees. However, as these applications move to cloud platforms such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform, new security concerns [...]

April 20th, 2017|Uncategorized|0 Comments

12 Must-Know Statistics on Cloud Usage in the Enterprise

Over the past decade, the cloud has become a disruptive force affecting every function and initiative in the enterprise. Gartner defines a strategic technology trend as “one with substantial disruptive potential that is just beginning to break out of an emerging state into broader impact and use.” For six consecutive years starting in 2009, the [...]

March 22nd, 2017|Uncategorized|0 Comments

CISO Beat: Delivering Secure Products

The phrase “digital transformation” has served as a catch-all in the IT industry for the shift in how companies use technology to operate in the mobile-cloud world. Until now, digital transformation has typically come up in conversations about the Chief Information Officer (CIO) role. The nature of digital business calls for security not just to [...]

March 10th, 2017|Uncategorized|0 Comments

New Report Finds Growing Security Risks to Custom Apps

The average enterprise today runs 464 in-house developed applications. These apps are internally facing for employees and externally facing for customers, partners, suppliers, etc. Increasingly, custom applications are moving to public cloud environments such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. While the public cloud offers numerous advantages including scale and cost, [...]

February 26th, 2017|Uncategorized|0 Comments

CIO Corner: Enterprises Prepare for the IaaS Storm

Cloud Infrastructure-as-a-Service (IaaS) offerings have transformed how enterprises develop and deploy custom applications for their employees and customers. Development teams and entire companies can deploy an application in the cloud without the overhead of a managing a datacenter. The rise of cloud coincides with the move across industries to digital business models – from mobile [...]

February 15th, 2017|Uncategorized|0 Comments

6 Cloud Threat Protection Best Practices from the Trenches

As enterprises continue to migrate their on-premises IT infrastructure to the cloud, they often find that their existing threat protection solutions aren’t sufficient to consistently detect threats that arise in the cloud. While security information and event management (SIEM) solutions continue to rely on rule-based (or heuristics-based) approach to detect threats, they often fail when [...]

January 25th, 2017|Uncategorized|0 Comments

5 Attributes of an Effective Cloud Threat Protection Solution

Cloud security has come a long way over the last few years. Today, most enterprise cloud service providers (CSPs) take responsibility for the security of the underlying application and its infrastructure. They protect against intrusions and attacks against their systems. However, securing the usage and data in the service is the customer’s responsibility, including how [...]

January 15th, 2017|Uncategorized|0 Comments

9 Unexpected Findings from Skyhigh’s Latest Cloud Report

Last week, Skyhigh published its latest Cloud Adoption and Risk Report (download a free copy here). The report is based on the anonymized cloud usage of more than 30 million employees who work at companies worldwide, making it one of the most authoritative sources on how people use cloud services in the workplace. Unlike the [...]

November 23rd, 2016|Uncategorized|0 Comments

CIO Corner: Failing to Prepare for Cloud Is Preparing to Fail

CIOs are responsible for preparing their companies for new technologies, which should mean they are comfortable with change. And yet cloud has proved to be such a transformational technology that many companies have lagged behind the adoption curve to the detriment of user productivity and security. In this week’s CIO Corner, we look at how [...]

October 28th, 2016|Uncategorized|0 Comments

Update: Companies Pay for Cybersecurity Failures

Yahoo Fallout Begins The largest data breach in history does not just go away. Victims are already feeling the consequences of Yahoo’s data breach, which impacted 500 million user accounts. Fraudsters are targeting breach victims with fake offers in the first of what will likely be years of fallout. The real risk for companies is [...]

October 15th, 2016|Uncategorized|0 Comments