Welcome!

Rajiv Gupta

Subscribe to Rajiv Gupta: eMailAlertsEmail Alerts
Get Rajiv Gupta via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Rajiv Gupta

The recent TweetDeck hack on Twitter presents a common cloud dilemma for information security teams.  On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers.  On the other hand, the free-wheeling nature of the cloud and the regular news of breaches creates a gap in security teams' ability to quickly assess risk and exposure for these types of events.  Further, with the cloud-based self-service model, it becomes more difficult to identify affected users and formulate a rational response plan. This shift not only drives home the importance of gaining in-depth visibility into cloud usage, but also emphasizes that the role of information security is transforming in terms of remediation strategies and user education.  As the... (more)

2014 Cloud Predictions: Enterprise IT Makes a Comeback

Enterprise IT organizations today often are bypassed as employees and LoBs use cloud services; in fact cloud computing is considered the revenge of the business unit. 2014 will be year that the Enterprise IT organizations move from role of helpless bystander to role of strategic partner to the business unit. It will be the year that the CIO carves out a new role of strategic importance, namely the enabler of cloud apps that drive agility, productivity and competitive advantage for their business units.  In 2014, CIOs and IT departments will use rapidly emerging cloud security sol... (more)

Five Questions Every CEO Should Ask Their CIO / CISO

Today is the one-year anniversary of the historic Snowden disclosure.  In the year since the first stories about Edward Snowden appeared, one of the lasting affects of the scandal is a heightened awareness of the risk posed by rogue insiders. This increased focus on rogue insiders has spread beyond the government to the private sector, and from security circles to corporate executives. From product designs, formulas, and customer information, all companies have data that could harm their business in the hands of a competitor, making insider threats like Snowden an executive-lev... (more)

Cold Hard Facts on Enterprise Cloud Use and Implications for Cloud Security

Here at Skyhigh Networks, we recently released the second edition of the Cloud Adoption and Risk Report. As with the first edition of the report, the purpose of the report is to provide hard data on the actual use of cloud services within enterprises of all sizes. This report summarizes data from approximately 6 million users across 175 companies and 10 industries. The key findings from the report are listed below and the full report can be downloaded here. The Wild West is Getting Wilder Data from more than 175 organizations suggests the use of cloud services is even more rampan... (more)