CFOtech India - Technology news for CFOs & financial decision-makers

Shadow IT stories

Story image
Understanding and defending against the dangers of using open-source software
4 days ago
#
virtualisation
#
casb
#
breach prevention
As businesses increasingly adopt open-source software for its benefits, they face significant security risks. Effective vetting, employee education, and dedicated security solutions are essential to mitigate these dangers.
Story image
Cloud security is a shared responsibility – and AI can help
Last month
#
saas
#
hybrid cloud
#
digital transformation
As Australian enterprises continue to invest heavily in cloud services, AI becomes vital for managing security in complex environments, addressing shadow IT and skill shortages.
Story image
Ruckus' comprehensive guide to digital strategy in schools
Wed, 20th Mar 2024
#
edutech
#
e-learning
#
casb
RUCKUS Networks offers a critical roadmap for Australian schools planning their digital strategies amidst increased investment and demand.
Story image
Major inefficiencies discovered in SaaS contract management
Fri, 8th Mar 2024
#
saas
#
casb
#
cloud services
A study by Vertice reveals businesses waste 385 hours in meetings annually due to inefficiencies in software contract management.
Story image
Check Point Software launches new SaaS security tool
Fri, 8th Mar 2024
#
casb
#
check point software
#
shadow it
Check Point Software launches Harmony SaaS, an innovative tool designed seamlessly integrate into existing infrastructure.
Story image
Australian & NZ workers fear businesses are ill-equipped for cyber threats
Tue, 13th Feb 2024
#
phishing
#
email security
#
casb
Nearly half of Australian and New Zealand workers do not feel ready to combat cyberattack threats, with 43% fearing becoming scam or phishing victims at work, ELMO Software research reveals.
Story image
Qualys expands CyberSecurity Asset Management with real-time identification
Fri, 2nd Feb 2024
#
iot
#
casb
#
risk & compliance
Qualys bolsters its CyberSecurity Asset Management with real-time identification of untrusted devices, providing complete internal attack surface coverage and reinforcing its status as an industry leader.
Story image
Shadow IT threatens corporate cybersecurity, new study reveals
Fri, 5th Jan 2024
#
advanced persistent threat protection
#
casb
#
okta
The rise in remote working has increased shadow IT usage among employees, leading to 11% of all cyber incidents, according to Kaspersky.
Story image
Zscaler launches Business Insights for improved SaaS optimisation
Thu, 14th Dec 2023
#
cloud security
#
casb
#
shadow it
Zscaler unveils Business Insights for SaaS usage and office utilisation, targeting cost reduction, enhanced productivity, and increased security.
Story image
Harmonic Security launches to help organisations use generative AI
Fri, 20th Oct 2023
#
data analytics
#
casb
#
ai
Security leaders are struggling to get their arms around the problem of unsafe use and lack visibility into what AI services their employees are using.
Story image
Australian businesses keen on passwordless technology's future
Tue, 17th Oct 2023
#
edutech
#
fintechs
#
financial systems
Almost all Australian IT leaders anticipate a shift to passwordless technology, expecting passwords to be limited to under 25% of logins.
Story image
Enterprises must adapt to Shadow AI to avoid data breaches
Wed, 5th Jul 2023
#
breach prevention
#
casb
#
risk & compliance
Insider data breaches are set to rise due to poor data controls and the use of generative AI tools, warns Imperva.
Story image
How can CISOs avoid burnout in the face of ransomware?
Tue, 14th Feb 2023
#
ransomware
#
saas
#
advanced persistent threat protection
The mass shift to remote and hybrid forms of working over the past couple of years has expanded the attack surface of organisations.
Story image
Securing shadow IT – May the force be with you!
Mon, 11th Jul 2022
#
devops
#
casb
#
apm
Shadow IT is increasing in organizations, making their cyber attack surfaces bigger than they realize. Here's how to bring it under control.
Story image
New study reveals 51% of employees using unauthorised apps
Fri, 1st Jul 2022
#
casb
#
management
#
shadow it
The research shows that 92% of employees and managers in large enterprises want full control over applications, but they don't have it.
Story image
50% of employees use unauthorised file services for work
Tue, 1st Mar 2022
#
advanced persistent threat protection
#
casb
#
knowbe4
KnowBe4 has released a new report showing half of the employees at shadow IT companies use unauthorised file services to complete their work.
Story image
Attack surface security vendor launches channel programme
Mon, 17th Aug 2020
#
casb
#
partner programmes
#
wipro
CyCognito enables users to identify externally-exposed systems and digital assets that are either unknown, uncontrolled or abandoned.
Story image
A10 Networks launches proxy for secure access and visibility into SaaS apps
Mon, 23rd Sep 2019
#
cloud security
#
application security
#
multi-cloud
A10 Networks unveils its new Cloud Access Proxy solution, boosting security and performance for SaaS apps like Office 365, plus centralised visibility.
Story image
Five major risks of letting shadow IT go unchecked
Thu, 15th Nov 2018
#
casb
#
data protection
#
cybersecurity
A department creating its own bespoke IT solution may sound like a good idea, but are the risks really worth it?.
Story image
5G could lead to shadow IoT if security is ignored
Tue, 24th Jul 2018
#
iot security
#
iot
#
casb
While 5G promises to shake up the world of mobile apps, communications, and IoT, 5G’s potential for scalability may end up taking a darker turn.