Welcome!

Rajiv Gupta

Subscribe to Rajiv Gupta: eMailAlertsEmail Alerts
Get Rajiv Gupta via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Rajiv Gupta

Here at Skyhigh Networks, we recently released the second edition of the Cloud Adoption and Risk Report. As with the first edition of the report, the purpose of the report is to provide hard data on the actual use of cloud services within enterprises of all sizes. This report summarizes data from approximately 6 million users across 175 companies and 10 industries. The key findings from the report are listed below and the full report can be downloaded here. The Wild West is Getting Wilder Data from more than 175 organizations suggests the use of cloud services is even more rampant than before. 2,675 cloud services are in use across more than 5.9 million users, as opposed to 2,204 services last quarter (21% growth). 626 cloud services are in use by an organization on average, as opposed to 545 last quarter (15% growth), and the highest number of cloud services in use... (more)

2014 Cloud Predictions: Enterprise IT Makes a Comeback

Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partner to the business unit. It will be the year that the CIO carves out a new role of strategic importance, namely the enabler of cloud apps that drive agility, productivity and competitive advantage for their business units.  In 2014, CIOs and IT departments will use rapidly emerging cloud security sol... (more)

Five Questions Every CEO Should Ask Their CIO / CISO

Today is the one-year anniversary of the historic Snowden disclosure.  In the year since the first stories about Edward Snowden appeared, one of the lasting affects of the scandal is a heightened awareness of the risk posed by rogue insiders. This increased focus on rogue insiders has spread beyond the government to the private sector, and from security circles to corporate executives. From product designs, formulas, and customer information, all companies have data that could harm their business in the hands of a competitor, making insider threats like Snowden an executive-lev... (more)

TweetDeck: Another Hack or a Missed Opportunity to Tighten Cloud Security?

The recent TweetDeck hack on Twitter presents a common cloud dilemma for information security teams.  On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers.  On the other hand, the free-wheeling nature of the cloud and the regular news of breaches creates a gap in security teams' ability to quickly assess risk and exposure for these types of events.  Further, with the cloud-based self-service model, it becomes more difficult to ident... (more)