Sekhar Sarukkai

Sekhar Sarukkai is a Co-founder and the Chief Scientist at Skyhigh Networks, driving the future of innovation and technology. He has more than 20 years of experience in enterprise networking, security, and cloud services development.

Cybersecurity Data Breaches: Incident Response Planning

By Sekhar Sarukkai | June 7, 2016

Incident Response Planning The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a

Did The FBI Make A Mistake In Publicly Fighting Apple?

By Sekhar Sarukkai | April 12, 2016

Apple News – The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one

A Closer Look at Insider Threats and Sensitive Data in the Cloud

By Sekhar Sarukkai | March 30, 2016

Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that  sensitive data in the cloud had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

By Sekhar Sarukkai | January 25, 2016

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

By Sekhar Sarukkai | December 21, 2015

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey

China says it’s created a facial recognition app for pandas

China says it’s created a facial recognition app for pandas

Researchers from the China Conservation and Research Centre for Giant Pandas have developed an app that could recognize individual pandas ...
Huawei will continue security support for Android smartphones

Huawei will continue security support for Android smartphones

LONDON (Reuters) - Huawei said on Monday it would continue to provide security updates and services for its smartphones and ...
BrandPost: Four Critical Reasons for Investing in Your WAN Edge

BrandPost: Four Critical Reasons for Investing in Your WAN Edge

The traditional network model of a central, physical data center hub with spokes running out to fixed locations has gone ...
Digital Acceleration Is At Cross Roads – Modernize Everything Or Die

Digital Acceleration Is At Cross Roads – Modernize Everything Or Die

Have you experienced or heard of anything similar to these anecdotes? “Tesla can’t figure out how to manage its glass ...
Add a recovery phone number to block automated hijack attempts: Google

Add a recovery phone number to block automated hijack attempts: Google

Study finds adding a phone number to a Google account blocks all automated attempts, 99% of bulk attacks, and 66% ...