Shadow IT: Security policies may be a problem

3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they use pe… Continue reading Shadow IT: Security policies may be a problem

The blueprint for a highly effective EASM solution

In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, … Continue reading The blueprint for a highly effective EASM solution

Baseline standards for BYOD access requirements

49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jam… Continue reading Baseline standards for BYOD access requirements

Network detection and response in the modern era

In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learni… Continue reading Network detection and response in the modern era

Shadow SaaS, changing contracts and ChatGPT adoption: SaaS trends to watch

A new study shows enterprises are gradually cutting down on unused software-as-a-service apps while increasing SaaS spending.
The post Shadow SaaS, changing contracts and ChatGPT adoption: SaaS trends to watch appeared first on TechRepublic.
Continue reading Shadow SaaS, changing contracts and ChatGPT adoption: SaaS trends to watch

The staying power of shadow IT, and how to combat risks related to it

There was a time, not too long ago, when most IT leaders believed shadow IT was a negligible element in their companies. They felt their IT organizations were so in control of what applications were purchased and who was granted access and that minimal… Continue reading The staying power of shadow IT, and how to combat risks related to it

Balancing security risks and innovation potential of shadow IT teams

Shadow IT teams, also known as rogue IT teams, have grown in popularity in recent years due to the rise of cloud-based apps and remote work. However, this has led to operational tension and security risks within many businesses. 58% of SMBs have experi… Continue reading Balancing security risks and innovation potential of shadow IT teams

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an […]

The post Cybersecurity 101: What is Attack Surface Management? appeared first on Security Intelligence.

Continue reading Cybersecurity 101: What is Attack Surface Management?