shadow IT

Security’s blind spot: The long-term state of exception
It seems every major hack is accompanied by the pointing of fingers. And there are plenty of places to point them: the servers that weren’t patched, the retailer who hadn’t …

Enable self-healing endpoint security with Application Persistence
In this podcast recorded at RSA Conference 2017, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, SVP of Product Development at Absolute …

Security practices need to evolve in order to handle complex threats
There is no one-size-fits-all security solution to address the threat landscape today’s businesses face. Each organization has unique security obstacles and obligations. …

Unsanctioned cloud services present growing problem for organizations
Enterprise cloud service usage continues to rise, and despite the best efforts of IT, unsanctioned cloud service usage remains a problem as half of all users of sanctioned …

Most email authentication implementations fail
Most of the world’s largest businesses fail at attempts to use open industry standards to control which email is sent using their names. Three quarters of large …

Shadow IT intensifies cloud security risks
Lack of visibility into an organization’s use of cloud providers can lead to unauthorized access to data, improper handling and storage of data and improper data removal. As a …

Four IT trends CIOs need to know about
CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today’s “third platform” …

Virtually all business cloud apps lack enterprise grade security
Blue Coat Systems analyzed apps for their ability to provide compliance, data protection, security controls and more. Of the 15,000 apps analyzed, it was revealed that 99 …

27% of cloud apps are high risk
As more and more organizations adopt cloud platforms, new shadow IT risk vectors are coming into play in the form of connected third-party apps, according to CloudLock …

Trust is the key to cloud adoption
Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …

Exposing the shadow data threat
Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …
Who’s afraid of shadow IT?
One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier …
Featured news
Resources
Don't miss
- SafeLine Bot Management: Self-hosted alternative to Cloudflare
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)
- Apple plugs zero-day holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201)
- When AI agents go rogue, the fallout hits the enterprise
- Inside PlugValley: How this AI vishing-as-a-service group operates