August 26, 2022
by Rodman Ramezanian
As is annual tradition now, Verizon recently released their latest “Data Breach Investigations Report” (DBIR), offering highlights and notable insights...
Read MoreI hear a lot of myths about what Zero Trust Network Access (ZTNA) is and how it compares to VPN. Some of…
— Stolen Cisco employee’s credentials and VPN access underscore the risks of authentication misuse Hot on the heels of numerous high-profile…
Headlines continue to report the shift workforces everywhere are turning to remote and hybrid options. With this new approach to…
Microsoft Office 365 is an indispensable business tool; widely used by organizations globally as they transition to the cloud. Unfortunately,…
Welcome to our first blog in the monthly Skyhigh Security “Ask Me Anything” series! We invite your audience to submit…
In today’s reality of heavy cloud usage both for personal and business purposes, web security has become of paramount concern…
Storing data is one of the most common uses for the cloud by enterprises. It’s often more cost-effective than using…
Just a couple weeks ago, Skyhigh Security attended Gartner’s Security & Risk Management Summit at the beautiful Gaylord National Resort…
Cyber threats are constantly evolving and becoming more complex. Since the pandemic and the rapid adoption of remote working, attack…