Report: Too many enterprises have shadow IT – unlocked doors with no cameras

New report says far too many firms have too many IT assets they cannot see or aren’t using, with some Windows servers lacking endpoint protection and patch management.
The post Report: Too many enterprises have shadow IT – unlocked doors with no camer… Continue reading Report: Too many enterprises have shadow IT – unlocked doors with no cameras

Beware of What Is Lurking in the Shadows of Your IT

This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections. An example of a threat vector that can bypass security protections is “shadow IT” and it is one that organizations must prepare for. Shadow IT […]

The post Beware of What Is Lurking in the Shadows of Your IT appeared first on Security Intelligence.

Continue reading Beware of What Is Lurking in the Shadows of Your IT

5 cybersecurity predictions for 2023

The cyber game is now an entire underground economy wrapped around cyberattacks. Thanks to increased international friction and the activity of groups such as Lapsus$, cybercriminals have upped the ante on cybercrime in order to turn a profit. Atakama … Continue reading 5 cybersecurity predictions for 2023

Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface

You’ve heard all about shadow IT, but there’s another shadow lurking on your systems: Internet of Things (IoT) devices.  These smart devices are the IoT in shadow IoT, and they could be maliciously or unintentionally exposing information. Threat actors can use that to access your systems and sensitive data, and wreak havoc upon your company. […]

The post Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface appeared first on Security Intelligence.

Continue reading Beyond Shadow IT: Expert Advice on How to Secure the Next Great Threat Surface

Tackling the threats posed by shadow IT

While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust security framework for their organization – encompassing all the person… Continue reading Tackling the threats posed by shadow IT

Shadow IT is a top concern related to SaaS adoption

Torii announced a report revealing that 69% of tech executives believe shadow IT is a top concern related to SaaS – or cloud application – adoption. The majority of respondents have made exceptions to their SaaS security protocols, with 80% doing so be… Continue reading Shadow IT is a top concern related to SaaS adoption

Data leaks and shadow assets greatly exposing organizations to cyberattacks

CybelAngel published a research revealing that data leaks and shadow assets are the greatest source of exposure to cyberattacks faced by large organizations across the globe. The report also highlights how the market pressures of 2021 led to an increas… Continue reading Data leaks and shadow assets greatly exposing organizations to cyberattacks

Employees are often using devices in seriously risky ways

Since the start of the pandemic, the modern workforce has become increasingly distributed, while employers have not been able to keep up with the changes in the way employees work. As a result, many high-risk activities and human behaviors continue to … Continue reading Employees are often using devices in seriously risky ways

Bots are lurking in your zombie and shadow APIs

By far this year’s biggest trend that we’ve observed in the land of APIs is that every organization has shadow and zombie APIs and they’re a much bigger issue than most people want to believe. Maybe they’re taking the “If I’ve never seen it, then it do… Continue reading Bots are lurking in your zombie and shadow APIs