shadow IT
Home workplaces introduce new risks, poor password hygiene
Entrust Datacard released the findings of its survey, which highlights the critical need to address data security challenges for employees working from home as a result of the …
Shadow IT accounts with weak passwords endanger organizations
63% of enterprise professionals have created at least one account without their IT department being aware of it, and two-thirds of those have created two or more, the results …
How IoT devices open a portal for chaos across the network
Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, …
52% of companies use cloud services that have experienced a breach
Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. Anonymized cloud event data showing percentage of files in the cloud …
When properly managed, shadow IT can benefit your organization
77 percent of IT professionals believe their organizations could earn an edge if company leaders were more collaborative with their businesses to find shadow IT solutions, …
Shine a light on shadow IT to improve organizational resilience
Shadow IT is one of the biggest challenges facing organizations today. According to Gartner, by 2020, a third of all cybersecurity attacks experienced by enterprises will be …
With shadow IT running rampant, how can IT keep pace?
Data privacy is high on the minds of businesses and consumers alike, as society at large is getting wise to the potential dangers that even seemingly innocuous apps (ie. …
Enterprises catching up with the explosion of cloud use and shadow IT in the workplace
Businesses worldwide are gaining control of previously unmonitored and unsupported cloud applications and devices, known as shadow IT, that lurk in their IT environments, …
What is shadow mining and why is it a security threat?
The majority of organizations are overlooking the threat of shadow mining, with 65 percent of organizations unfamiliar with the term and more than half (57 percent) unfamiliar …
Prevent shadow IT: Companies need security covering multiple communication vectors
There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …
Cloud interoperability and app mobility outrank cost and security for primary hybrid cloud benefits
Enterprises plan to increase hybrid cloud usage, with 91% stating hybrid cloud as the ideal IT model, but only 18% stating they have that model today, according to Nutanix. …
Despite rise in security awareness, employees’ poor security habits are getting worse
Despite an increased focus on cybersecurity awareness in the workplace, employees’ poor cybersecurity habits are getting worse, compounded by the speed and complexity of the …
Featured news
Resources
Don't miss
- Why I’m done calling humans the weakest link
- TeamPCP’s attack spree slows, but threat escalates with ransomware pivot
- Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
- Why risk alone doesn’t get you to yes
- ShipSec Studio brings open-source workflow orchestration to security operations