Shadow IT stories
![Story image](../../../../../uploads/story/2024/07/24/preview_techday_89ef25794f5a627dbf88.webp)
Understanding and defending against the dangers of using open-source software
3 days ago
#
virtualisation
#
casb
#
breach prevention
As businesses increasingly adopt open-source software for its benefits, they face significant security risks. Effective vetting, employee education, and dedicated security solutions are essential to mitigate these dangers.
![Story image](../../../../../uploads/story/2024/06/24/preview_techday_3aff3fa72fafedec9d26.webp)
Cloud security is a shared responsibility – and AI can help
Last month
#
saas
#
hybrid cloud
#
digital transformation
As Australian enterprises continue to invest heavily in cloud services, AI becomes vital for managing security in complex environments, addressing shadow IT and skill shortages.
![Story image](../../../../../uploads/story/2024/03/13/preview_img-7plBioDotw1ZROSe1yAFdNja.webp)
Ruckus' comprehensive guide to digital strategy in schools
Wed, 20th Mar 2024
#
edutech
#
e-learning
#
casb
RUCKUS Networks offers a critical roadmap for Australian schools planning their digital strategies amidst increased investment and demand.
![Story image](../../../../../uploads/story/2024/03/08/preview_img-5uTlEOEnj34cTtpTYX15Zjqo.webp)
Major inefficiencies discovered in SaaS contract management
Fri, 8th Mar 2024
#
saas
#
casb
#
cloud services
A study by Vertice reveals businesses waste 385 hours in meetings annually due to inefficiencies in software contract management.
![Story image](../../../../../uploads/story/2024/03/07/preview_img-FummDXntaEfjs9gTSDN9YbVy.webp)
Check Point Software launches new SaaS security tool
Fri, 8th Mar 2024
#
casb
#
check point software
#
shadow it
Check Point Software launches Harmony SaaS, an innovative tool designed seamlessly integrate into existing infrastructure.
![Story image](../../../../../uploads/story/2024/02/13/preview_img-YEVJRQrNazFVl82XlEjctklJ.webp)
Australian & NZ workers fear businesses are ill-equipped for cyber threats
Tue, 13th Feb 2024
#
phishing
#
email security
#
casb
Nearly half of Australian and New Zealand workers do not feel ready to combat cyberattack threats, with 43% fearing becoming scam or phishing victims at work, ELMO Software research reveals.
![Story image](../../../../../uploads/story/2024/02/02/preview_img-7TKlAhq4S44tsBAEE7Jbl3YI.webp)
Qualys expands CyberSecurity Asset Management with real-time identification
Fri, 2nd Feb 2024
#
iot
#
casb
#
risk & compliance
Qualys bolsters its CyberSecurity Asset Management with real-time identification of untrusted devices, providing complete internal attack surface coverage and reinforcing its status as an industry leader.
![Story image](../../../../../uploads/story/2024/01/04/preview_img-Wg6WZLarbRyOCSjFKC2anhCw.webp)
Shadow IT threatens corporate cybersecurity, new study reveals
Fri, 5th Jan 2024
#
advanced persistent threat protection
#
casb
#
okta
The rise in remote working has increased shadow IT usage among employees, leading to 11% of all cyber incidents, according to Kaspersky.
![Story image](../../../../../uploads/story/2023/12/13/preview_img-gWKP62sFUhkBvlSPBY2NWs9Z.webp)
Zscaler launches Business Insights for improved SaaS optimisation
Thu, 14th Dec 2023
#
cloud security
#
casb
#
shadow it
Zscaler unveils Business Insights for SaaS usage and office utilisation, targeting cost reduction, enhanced productivity, and increased security.
![Story image](../../../../../uploads/story/2023/10/20/preview_ai_talk.webp)
Harmonic Security launches to help organisations use generative AI
Fri, 20th Oct 2023
#
data analytics
#
casb
#
ai
Security leaders are struggling to get their arms around the problem of unsafe use and lack visibility into what AI services their employees are using.
![Story image](../../../../../uploads/story/2023/10/17/preview_pass.webp)
Australian businesses keen on passwordless technology's future
Tue, 17th Oct 2023
#
edutech
#
fintechs
#
financial systems
Almost all Australian IT leaders anticipate a shift to passwordless technology, expecting passwords to be limited to under 25% of logins.
![Story image](../../../../../uploads/story/2023/07/05/preview_GettyImages-1462983186.webp)
Enterprises must adapt to Shadow AI to avoid data breaches
Wed, 5th Jul 2023
#
breach prevention
#
casb
#
risk & compliance
Insider data breaches are set to rise due to poor data controls and the use of generative AI tools, warns Imperva.
![Story image](../../../../../uploads/story/2023/02/14/preview_GettyImages-1223711285.webp)
How can CISOs avoid burnout in the face of ransomware?
Tue, 14th Feb 2023
#
ransomware
#
saas
#
advanced persistent threat protection
The mass shift to remote and hybrid forms of working over the past couple of years has expanded the attack surface of organisations.
![Story image](../../../../../uploads/story/2022/07/11/preview_GettyImages-649191180.webp)
Securing shadow IT – May the force be with you!
Mon, 11th Jul 2022
#
devops
#
casb
#
apm
Shadow IT is increasing in organizations, making their cyber attack surfaces bigger than they realize. Here's how to bring it under control.
![Story image](../../../../../uploads/story/2022/07/01/preview_GettyImages-874813790.webp)
New study reveals 51% of employees using unauthorised apps
Fri, 1st Jul 2022
#
casb
#
management
#
shadow it
The research shows that 92% of employees and managers in large enterprises want full control over applications, but they don't have it.
![Story image](../../../../../uploads/story/2022/03/01/preview_GettyImages-1282840319.webp)
50% of employees use unauthorised file services for work
Tue, 1st Mar 2022
#
advanced persistent threat protection
#
casb
#
knowbe4
KnowBe4 has released a new report showing half of the employees at shadow IT companies use unauthorised file services to complete their work.
![Story image](../../../../../uploads/story/2020/08/17/preview_GettyImages-147860345.webp)
Attack surface security vendor launches channel programme
Mon, 17th Aug 2020
#
casb
#
partner programmes
#
wipro
CyCognito enables users to identify externally-exposed systems and digital assets that are either unknown, uncontrolled or abandoned.
![Story image](../../../../../uploads/story/2019/09/23/preview_applications.webp)
A10 Networks launches proxy for secure access and visibility into SaaS apps
Mon, 23rd Sep 2019
#
cloud security
#
application security
#
multi-cloud
A10 Networks unveils its new Cloud Access Proxy solution, boosting security and performance for SaaS apps like Office 365, plus centralised visibility.
![Story image](../../../../../uploads/story/2018/10/30/preview_ThinkstockPhotos-504709676__1_.webp)
Five major risks of letting shadow IT go unchecked
Thu, 15th Nov 2018
#
casb
#
data protection
#
cybersecurity
A department creating its own bespoke IT solution may sound like a good idea, but are the risks really worth it?.
![Story image](../../../../../uploads/story/2018/07/24/preview_ThinkstockPhotos-1005147730.webp)
5G could lead to shadow IoT if security is ignored
Tue, 24th Jul 2018
#
iot security
#
iot
#
casb
While 5G promises to shake up the world of mobile apps, communications, and IoT, 5G’s potential for scalability may end up taking a darker turn.