Displaying items by tag: Shadow IT

A new Australian survey shows that corporate users are avoiding VPNs despite being requested to use them for secure access to corporate networks and data.

Published in Security

CTO, CIO, CISO and IT administrators must grapple with and gain control of Shadow IT – BYO devices and often insecure or inappropriate consumer software being used covertly in the enterprise workspace.

Published in Security

First it was shadow IT software, and now it Is shadow IT assets – both can have the same devastating effect on the best-laid enterprise security plans.

Published in Security
Page 3 of 4



Recent Comments