shadow IT

27% of cloud apps are high risk
As more and more organizations adopt cloud platforms, new shadow IT risk vectors are coming into play in the form of connected third-party apps, according to CloudLock …

Trust is the key to cloud adoption
Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …

Exposing the shadow data threat
Blue Coat conducted an analysis using the Elastica CloudSOC platform provided insights into 63 million enterprise documents within leading cloud applications, including …
Who’s afraid of shadow IT?
One of the biggest disruptions in the IT world is the quantity and quality of SaaS tools. From email and storage, to phone systems and infrastructure, it has never been easier …
What drives employees to shadow IT?
While 94 percent of knowledge workers recognize the importance of collaboration and 83 percent use technology to collaborate, 59 percent are not satisfied with the tools they …
Shadow IT is prevalent in government agencies
Despite clear benefits of cloud services – greater collaboration, agility, and cost savings – federal agencies are slow to migrate to the cloud due to security concerns. As a …
Listen to your employees or deal with shadow IT
Data leakage, compliance breaches, business inefficiency and hidden costs are just some of the risks organizations are leaving themselves open to by not meeting the IT demands …
100 million cloud file analysis reveals shadow data threat
Elastica conducted a security analysis of more than 100 million files being shared and stored in leading public-cloud applications. Research revealed that 20 percent of …
Cyber espionage moves out of the shadows
During the first half of 2013, AppRiver screened more than 15 billion messages, nearly 13 billion of which were spam and another 171 million that carried viruses. Once again, …
Featured news
Resources
Don't miss
- Product showcase: iStorage diskAshur PRO3
- As AI tools take hold in cybersecurity, entry-level jobs could shrink
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies