Shadow IT stories - Page 8
Qualys expands CyberSecurity Asset Management with real-time identification
Fri, 2nd Feb 2024
#
iot
#
casb
#
risk & compliance
Qualys bolsters its CyberSecurity Asset Management with real-time identification of untrusted devices, providing complete internal attack surface coverage and reinforcing its status as an industry leader.
Shadow IT threatens corporate cybersecurity, new study reveals
Fri, 5th Jan 2024
#
advanced persistent threat protection
#
casb
#
it industry
The rise in remote working has increased shadow IT usage among employees, leading to 11% of all cyber incidents, according to Kaspersky.
Zscaler launches Business Insights for improved SaaS optimisation
Thu, 14th Dec 2023
#
cloud security
#
casb
#
cloud services
Zscaler unveils Business Insights for SaaS usage and office utilisation, targeting cost reduction, enhanced productivity, and increased security.
Harmonic Security launches to help organisations use generative AI
Fri, 20th Oct 2023
#
data analytics
#
casb
#
ai
Security leaders are struggling to get their arms around the problem of unsafe use and lack visibility into what AI services their employees are using.
Enterprises must adapt to Shadow AI to avoid data breaches
Wed, 5th Jul 2023
#
casb
#
breach prevention
#
risk & compliance
Insider data breaches are set to rise due to poor data controls and the use of generative AI tools, warns Imperva.
How can CISOs avoid burnout in the face of ransomware?
Tue, 14th Feb 2023
#
saas
#
ransomware
#
advanced persistent threat protection
The mass shift to remote and hybrid forms of working over the past couple of years has expanded the attack surface of organisations.
Securing shadow IT – May the force be with you!
Mon, 11th Jul 2022
#
devops
#
casb
#
apm
Shadow IT is increasing in organizations, making their cyber attack surfaces bigger than they realize. Here's how to bring it under control.
New study reveals 51% of employees using unauthorised apps
Fri, 1st Jul 2022
#
edutech
#
casb
#
management
The research shows that 92% of employees and managers in large enterprises want full control over applications, but they don't have it.
Attack surface security vendor launches channel programme
Mon, 17th Aug 2020
#
partner programmes
#
casb
#
shadow it
CyCognito enables users to identify externally-exposed systems and digital assets that are either unknown, uncontrolled or abandoned.
A10 Networks launches proxy for secure access and visibility into SaaS apps
Mon, 23rd Sep 2019
#
cloud security
#
application security
#
multi-cloud
A10 Networks unveils its new Cloud Access Proxy solution, boosting security and performance for SaaS apps like Office 365, plus centralised visibility.
Five major risks of letting shadow IT go unchecked
Thu, 15th Nov 2018
#
data protection
#
casb
#
cybersecurity
A department creating its own bespoke IT solution may sound like a good idea, but are the risks really worth it?.
Contractors, unstructured data amongst major security concerns, says SailPoint
Wed, 17th May 2017
#
casb
#
passwords
#
shadow it
SailPoint's Market Pulse Survey highlights contractors and unstructured data as major security risks for enterprises.
Shadow data could cost organisations millions
Wed, 27th Jan 2016
#
document management
#
ecm
#
martech
The threat of shadow data in the enterprise is on the rise as cloud app usage surges, opening organisations to $1.9 million in potential losses.
Dissatisfaction drives employees to the dark side of tech
Thu, 27th Aug 2015
#
uc
#
casb
#
collaboration
Dissatisfaction with business collaboration tools is driving employees to turn to unsanctioned and unsecure technology, and driving up shadow IT.
Blue Coat forms endpoint security alliance
Tue, 4th Aug 2015
#
firewalls
#
network security
#
iot
Blue Coat unveils an endpoint alliance ecosystem, allowing intelligence from partner endpoint solutions to be shared with the entire Blue Coat range.
Shadow IT: Bringing business benefits despite security concerns
Mon, 6th Jul 2015
#
casb
#
cybersecurity
#
ovum
Instead of seeing shadow IT as a major problem, more chief information security officers (CISOs) are seeing the business benefits of the phenomenon.