Cloud Security August 25, 2016 Three Overlooked Benefits of a CASB 2 min read - A CASB is helpful for harnessing shadow IT cloud applications, but it can also offer three additional benefits that companies often overlook.
Cloud Security July 25, 2016 Just Discovering Shadow IT Isn’t Enough to Improve a Company’s Cloud Security Posture 2 min read - Businesses large and small have adopted cloud applications, and most companies have a growing concern about their cloud security.
Identity & Access July 12, 2016 The Insider Threat: Are You at Risk? 4 min read - Some security red flags, such as the presence of shadow IT and weak authentication practices, could indicate a high risk for an insider threat.
Cloud Security May 23, 2016 How to Fix the Cybersecurity Blind Spot That Is Shadow IT 2 min read - Taking advantage of security technology that can help protect against the blind spot challenges of shadow IT makes perfect sense.
January 25, 2016 File Sharing Puts Enterprise Data at Risk, Report Says 2 min read - The oversharing of enterprise data through shadow IT practices can lead to security issues regarding that information, including data leaks.
Cloud Security November 20, 2015 Five Steps to Help Employees Safely Use Cloud Services 4 min read - Companies need to empower employees to use flexible cloud services to work effectively. Establishing proper services means doing this safely and securely.
Intelligence & Analytics November 9, 2015 Clear the Fog From Your Cloud Security Strategy < 1 min read - With data and applications now living outside an enterprise's firewalls, implementing a strong cloud security strategy has become incredibly important.
Cloud Security September 25, 2015 Lines of Business, Cloud-Based Apps and the Implications of Shadow IT 2 min read - When the lines of business within an enterprise create a culture of shadow IT, it can have far-reaching consequences for the organization as a whole.
Endpoint September 25, 2014 You Want to Plug What in? 5 Tips for Evaluating IoT Devices 3 min read - Personal Internet-connected electronics, designed primarily for home use, are rapidly finding their way into the enterprise. IoT is coming, are you ready?