IBM employees banned from using portable storage devices

In an attempt to minimize sensitive data loss, IBM will try out a worldwide, company-wide ban on the use of removable portable storage devices such as USB sticks, SD cards, and flash drives. The introduction of the new policy is scheduled for the end o… Continue reading IBM employees banned from using portable storage devices

Exposing the threat of shadow devices

Infoblox announced new research that exposes the significant threat posed by shadow devices on enterprise networks. Researchers found that enterprise networks across the US, UK and Germany have thousands of shadow personal devices – such as laptops, ki… Continue reading Exposing the threat of shadow devices

Cut Through the Fog: Improve Cloud Visibility to Identify Shadow IT

Security teams need a single, scalable cloud solution that integrates seamlessly with a SIEM platform to identify shadow IT — and cut through the fog of cloud security.

The post Cut Through the Fog: Improve Cloud Visibility to Identify Shadow IT appeared first on Security Intelligence.

Continue reading Cut Through the Fog: Improve Cloud Visibility to Identify Shadow IT

It’s Time to Bring Cloud Environments Out of the Shadows

Business leaders often rush to migrate corporate assets to cloud environments to boost productivity and lower costs, but adopting cloud services without proper oversight can put data at risk.

The post It’s Time to Bring Cloud Environments Out of the Shadows appeared first on Security Intelligence.

Continue reading It’s Time to Bring Cloud Environments Out of the Shadows

How identity can control shadow IT

Cloud has fundamentally changed the way that IT departments have to think. While enterprises use to look for monolithic software packages that threw usability to the wayside, employees now want consumer-focused solutions that solve specific business needs. Each of these applications come with their own identity and data management problems, which can lead to frustration among IT and security teams. It doesn’t have to be this way. By focusing on identity management, IT departments are able to solve for many of those concerns and actually simplify access to cloud applications, which makes them more secure. In the latest CyberScoop Radio podcast, Chris Niggel, Okta’s director of security and compliance talks about how identity management can be the catalyst to turn shadow IT into distributed IT. By implementing a strong tool, users can get their work done at any time from any place, while security teams can be confident their enterprise’s […]

The post How identity can control shadow IT appeared first on Cyberscoop.

Continue reading How identity can control shadow IT

As the cloud’s popularity grows, so does the risk to sensitive data

While the vast majority of global companies (95%) have adopted cloud services, there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data… Continue reading As the cloud’s popularity grows, so does the risk to sensitive data

Transform Your Security Strategy to Avoid Digital Roadblocks

To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.

The post Transform Your Security Strategy to Avoid Digital Roadblocks appeared first on Security Intelligence.

Continue reading Transform Your Security Strategy to Avoid Digital Roadblocks

Bringing Shadow IT Into the Security Light

Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise’s security posture.

The post Bringing Shadow IT Into the Security Light appeared first on Security Intelligence.

Continue reading Bringing Shadow IT Into the Security Light

Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass

Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.

The post Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass appeared first on Security Intelligence.

Continue reading Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass

Security’s blind spot: The long-term state of exception

It seems every major hack is accompanied by the pointing of fingers. And there are plenty of places to point them: the servers that weren’t patched, the retailer who hadn’t finished setting up an intrusion detection system, the high-ranking official who used his personal email to store secrets, the critical application with unfixed security holes because the programmers hadn’t finished fixing them yet, the users of unapproved cloud or mobile applications for corporate data. What … More Continue reading Security’s blind spot: The long-term state of exception