shadow IT
5 cybersecurity predictions for 2023
The cyber game is now an entire underground economy wrapped around cyberattacks. Thanks to increased international friction and the activity of groups such as Lapsus$, …
Tackling the threats posed by shadow IT
While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust …
Shadow IT is a top concern related to SaaS adoption
Torii announced a report revealing that 69% of tech executives believe shadow IT is a top concern related to SaaS – or cloud application – adoption. The majority of …
Data leaks and shadow assets greatly exposing organizations to cyberattacks
CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. …
Employees are often using devices in seriously risky ways
Since the start of the pandemic, the modern workforce has become increasingly distributed, while employers have not been able to keep up with the changes in the way employees …
Bots are lurking in your zombie and shadow APIs
By far this year’s biggest trend that we’ve observed in the land of APIs is that every organization has shadow and zombie APIs and they’re a much bigger issue than most people …
Why virtual desktops make sense for a virtual workforce
Across the country businesses and public agencies alike are holding virtual job fairs and summits and talking about the effects of the virtual workforce. Faced with skilled …
SaaS security in 2021
The migration toward subscription-based services via the SaaS business model isn’t new this year — it’s part of a larger shift away from on-premises datacenters, applications, …
78% of Microsoft 365 admins don’t activate MFA
On average, 50% of users at enterprises running Microsoft 365 are not managed by default security policies within the platform, according to CoreView. Microsoft 365 …
25% of IT workers don’t enforce security policies
14% of IT workers are consumed with Identity and Access Management (IAM), spending at least an hour per day on routine IAM tasks, according to 1Password. IAM continues to be a …
Threat highlight: Analysis of 5+ million unmanaged, IoT, and IoMT devices
A new study incorporates analysis of anonymized data from more than 5 million unmanaged, IoT, and IoMT devices in Ordr customer deployments across a variety of verticals …
Ransomware attacks are increasing, do you have an emergency plan in place?
39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 …