Already on ArticleSlash?

Forgot your password? Sign Up
 Article Directory   Author   Adam Chris
 

Adam Chris  RSS Feed

Published Articles:48
Total Article Views:5,444 (unique visitors)
Total Article Rank:1 /5 (2 Ratings)

(India)Author

Adam Chris's Articles

Articles by: Adam Chris

Recent Articles

In Plain Sight: How Hackers Exfiltrate Corporate Data Using ..

Consumers and companies are embracing cloud services because they offer capabilities simply not available with traditional software. Cyber criminals are also beginning to use the cloud because it ..
(November 04, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 154

The Data Factory: 12 Essential Facts on Enterprise Cloud Usage .

Between headlines from the latest stories on data breaches and the hottest new apps on the block, it’s easy to be captivated with what people are saying, blogging, and tweeting about the state ..
(November 04, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 95

Compliance, Governance, and Salesforce, Oh My!

Back in June we announced that Salesforce participated in Skyhigh’s Series C funding round as a strategic investor. The move validated our status as a category-creating company dedicated to ..
(October 21, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 144

POODLE – How bad is its bite? (Here’s the data)

A major vulnerability affecting the security of cloud services dubbed POODLE (Padding Oracle on Downgraded Legacy Encryption) was reported on October 14th by three Google security researchers Bodo ..
(October 21, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 134

The 7 Deadly Sins of Cloud Data Loss Prevention

It’s good to learn from your mistakes. It’s even better to learn from the mistakes of others. Skyhigh has some of the security world’s most seasoned data loss prevention (DLP) ..
(October 14, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 131

The Fastest Growing Cloud Apps of 2014

The cloud is growing exponentially and SaaS provider revenue in 2014 is set to surpass $18 billion, making the cloud application market larger than previous major shifts in technology at key points ..
(October 14, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 93

A New Standard for Transparency in Encryption: Introducing ..

Encryption is fast becoming a must-have feature for data stored in the cloud. Between privacy concerns stemming from regulatory requirements and NSA surveillance, companies expect either cloud ..
(October 14, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 357

Was the Cloud ShellShocked? - Skyhigh

Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds. Shellshock ..
(October 07, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 117

New Tech Players Utilize Old Playbook at BoxWorks

Startups are often successful because of their ability to thumb their noses at the status quo, but these days there are two tools that young tech gurus are borrowing from their predecessors. Box ..
(October 07, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 102

5 Easy Steps to Bolster your Google Drive Security

The latest in the news with respect to data breaches involve the unscrupulous hacking of private Gmail accounts, and to add to the newsworthiness of data security, many celebrities had private photos .
(October 07, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 159

Cloud Security Vendors Poised for Growth

Security services have seen advances in identity and access management services; however, encryption services are lagging in the security industry. According to Gartner, revenues for identity and ..
(October 06, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 123

Preventing Data Loss in a World of Industrialized Hacking

Every year billions of dollars are lost due to financial fraud and digital fraud has become one of the target markets for fraudsters. The best weapon for today’s business environment is big ..
(October 06, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 132

Cloud Security Requires a Multi-Layered Approach

Cloud service providers can make many promises regarding their data center’s physical security, but it is vital that you are able to understand the logical, remote and application dimensions to .
(October 06, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 121

The Importance of Data Loss Prevention Software in the ..

Recent information compiled by Forrester stresses the need for data loss prevention software throughout the healthcare industry. In the age of electronic health records that help providers record and .
(September 29, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 125

Will Security Kill The Cloud?

Hardware such as thumb drives, cell phones, laptops and even computers are becoming outdated in terms of their utility as data storage devices. They are easily lost, stolen or prone to damage by ..
(September 29, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 118

Healthcare Data Breach Risks Drive Data Loss Prevention Market

Electronic health records have become a more efficient and effective way for health care providers and patients to share medical records. Electronic health records provide convenience and cost ..
(September 29, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 151

11 Cloud Computing Predictions for 2014

The big trends of 2013 – cloud, BYOD, big data and social – will continue into 2014. The difference in 2014 is the fact that the cloud is quickly becoming the foundation beneath those ..
(September 24, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 138

Skyhigh 1st Cloud Access Security Broker to be ISO 27001 ..

One of the most robust certifications a cloud security service provider can attain is ISO 27001 certification. Attaining ISO certification is is a reflection of the company’s commitment to ..
(September 23, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 108

Dyre Straits: Millions of Cloud Users Vulnerable to New Trojan

A powerful new strain of malware called Dyre (or Dyreza) not only poses a serious threat to consumers and businesses, it also signifies the cloud has arrived. Dyre not only uses the cloud as a vector .
(September 23, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 129

Only 1 in 100 Cloud Providers Meet Proposed EU Data Protection .

Whether your organization is based in Europe, has operations in Europe, or handles data pertaining to EU residents, a proposed EU regulation in the works will have a significant impact on which cloud .
(September 23, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 121

Skyhigh 1st Cloud Access Security Broker to be ISO 27001 ..

One of the most robust certifications a cloud security service provider can attain is ISO 27001 certification. Attaining ISO certification is is a reflection of the company’s commitment to ..
(September 22, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 219

Point-in-Time Cloud Usage Data Can Be Deceiving

A Telling StoryA customer recently shared an interesting story with us. They told us that they were monitoring the growth in cloud service usage over time and saw some interesting patterns that we ..
(September 22, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 86

A Prescription for Cloud Data Security for Healthcare Service ..

Cloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now, according to Pike ..
(September 22, 2014)
 | 
  • Currently 1.00/5
 | Computers-and-Technology/Software | Visitors: 78

Data Loss Prevention Tools Sought by Mobile, Social, Cloud ..

Companies worldwide are making room in their budgets for line items like security for the technological resources they use. More and more companies are seeing the benefits of spending to receive the ..
(September 15, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 73

New Opportunities for Data Loss Prevention

In this digital age, the threat on data security is growing every day. Fortunately, security measures are growing as well, and companies are spending more money every year to prevent these losses. ..
(September 12, 2014)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 80