Digital Transformation / DX
Artificial Intelligence / AI
Internet of Things / IOT
Shadow IT stories
Attack surface security vendor launches channel programme
CyCognito enables users to identify externally-exposed systems and digital assets that are either unknown, uncontrolled or abandoned.
A10 Networks launches proxy for secure access and visibility into SaaS apps
The CAP solution ensures that access to SaaS applications and data is secured while maintaining centralised visibility across sanctioned and unsanctioned applications.
Five major risks of letting shadow IT go unchecked
A department creating its own bespoke IT solution may sound like a good idea, but are the risks really worth it?
5G could lead to shadow IoT if security is ignored
While 5G promises to shake up the world of mobile apps, communications, and IoT, 5G’s potential for scalability may end up taking a darker turn.
SonicWall focuses on the mid-market with latest product announcements
“Our Capture Cloud Platform delivers increased value, ease of use and the security efficacy required for today’s cyber arms race.”
Research report: What cloud migration means for modern businesses
Businesses of all shapes and sizes have different rationale for having moved or considering to move workloads into the cloud.
Study: Even the Australian C-Suite flouts cybersecurity policies
Employees in some of Australia’s largest organisations are flouting cybersecurity policies and it’s not just junior employees who are guilty.
Contractors, unstructured data amongst major security concerns, says SailPoint
“By putting identity at the centre of security and IT operations, these organisations can move their IT teams out of full-time firefighting mode."
Shadow IT: Why danger lurks in dark spaces
The presence of unknown cloud services makes it difficult for security teams to identify and manage the organisations total attack surface.
Are you sick of shadow IT's ever-looming digital danger?
There is a worrying trend for businesses to look at shadow IT as great examples of becoming digital. But in truth it is the exact opposite.
Taking advantage of shadow IT to achieve digital transformation
“Organisations shouldn’t surrender to or ignore shadow IT; rather, they should leverage it to bring new solutions forward."
Shadow data could cost organisations millions
The threat of shadow data in the enterprise is on the rise as cloud app usage surges, opening organisations to $1.9 million in potential losses.
CIOs fighting back against shadow IT
A new report says CIOs are increasingly being left out of the IT purchasing loop - but they're fighting back, becoming internal service providers.
Dissatisfaction drives employees to the dark side of tech
Dissatisfaction with business collaboration tools is driving employees to turn to unsanctioned and unsecure technology, and driving up shadow IT.
MIT: Encouraging NZ's female students to get into tech
In order to encourage young New Zealand women to consider a career in IT, MIT is holding an event on September 3 2015.
Shadow IT: Bringing business benefits despite security concerns
Instead of seeing shadow IT as a major problem, more chief information security officers (CISOs) are seeing the business benefits of the phenomenon.
Shadow IT rife within business; what are you going to do?
CipherCloud has identified an increasing number of enterprises need help with cloud visibility problems, and have launched a Cloud Discovery Enterpris
Shadow IT on the rise: Are you prepared?
"It is important to protect against risks now as shadow IT has a strong footprint inside many enterprises and will not fade anytime soon."