Virtually all business cloud apps lack enterprise grade security

Blue Coat Systems analyzed apps for their ability to provide compliance, data protection, security controls and more. Of the 15,000 apps analyzed, it was revealed that 99 percent do not provide sufficient security, compliance controls and features to effectively protect enterprise data in the cloud. Shadow data still a major threat Their report revealed that shadow data, unmanaged content employees store and share across cloud apps, continues to remain a major threat, with 23 percent … More Continue reading Virtually all business cloud apps lack enterprise grade security

Just Discovering Shadow IT Isn’t Enough to Improve a Company’s Cloud Security Posture

Businesses large and small have adopted cloud applications, and most companies have a growing concern about their cloud security.

The post Just Discovering Shadow IT Isn’t Enough to Improve a Company’s Cloud Security Posture appeared first on Security Intelligence.

Continue reading Just Discovering Shadow IT Isn’t Enough to Improve a Company’s Cloud Security Posture

The Insider Threat: Are You at Risk?

Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.

The post The Insider Threat: Are You at Risk? appeared first on Security Intelligence.

Continue reading The Insider Threat: Are You at Risk?

27% of cloud apps are high risk

As more and more organizations adopt cloud platforms, new shadow IT risk vectors are coming into play in the form of connected third-party apps, according to CloudLock CyberLab’s analysis across 10 million users, 1 billion files, and nearly 160,000 unique applications. These apps (and by extension, their vendors) are authorized using corporate credentials, have API access to corporate data on multiple SaaS platforms via OAuth connections, and can act on behalf of users to access, … More Continue reading 27% of cloud apps are high risk

How to Fix the Cybersecurity Blind Spot That Is Shadow IT

Taking advantage of security technology that can help protect against the blind spot challenges of shadow IT makes perfect sense.

The post How to Fix the Cybersecurity Blind Spot That Is Shadow IT appeared first on Security Intelligence.

Continue reading How to Fix the Cybersecurity Blind Spot That Is Shadow IT

Trust is the key to cloud adoption

Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding growing cloud adoption. With a majority (77 percent) of participants noting that their organizations trust cloud computing more than a year ago, just 13 percent completely trust public cloud providers to secure sensitive data. These findings highlight improved trust and security are critical to encouraging continued adoption of the cloud. “This is a … More Continue reading Trust is the key to cloud adoption