Shadow IT – Get Out of the Dark

Shadow IT – Get Out of the Dark

Shadow IT–the stuff that goes on without IT’s involvement–brings many risks to an organization. If users have excessive privileges, they […] ...
AppSec, AI, API app Google application security AppSec

Personal App Use on the Rise – And So Are Cloud Security Risks

Shadow IT and BYOD are not new problems, but the pandemic highlighted just how much workers rely on cloud applications to increase their productivity. The use of personal apps on the corporate ...
Security Boulevard
cybersecurity future hope

Why 2022 Should be a Year of Cybersecurity Optimism

2021 has been a year that few in the cybersecurity world will miss. From coping with the ongoing effects of the COVID-19 pandemic to emerging trends and threats in the world of ...
Security Boulevard
Temp-800x500.jpg

IT Risk Assessment: Is Your Plan Up to Scratch?

A risk assessment is a process by which businesses identify risks and threats that may disrupt their continuity and haltRead More The post IT Risk Assessment: Is Your Plan Up to Scratch? ...
Shadow IT: Why It Exists and How to Deal With It

Shadow IT: Why It Exists and How to Deal With It

What Is Shadow IT? Shadow IT is the use of information technology systems, software, devices, services and applications outside of,Read More The post Shadow IT: Why It Exists and How to Deal ...
malware Raspberry Robin evasion

Shadow IT, Cloud-Based Malware Increase AppSec Risks

Cloud application security risks continue to rise as malware delivered by cloud applications continues to grow, according to a study by Netskope. The biannual study also highlighted the potential for critical data ...
Security Boulevard
historic-columbia-river-highway-hairpin-curve-on-the-rowena-loops-4a28c8-1600

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

Secure Web Gateways (SWGs), software for controlling access to websites and SaaS not managed by corporate IT, have evolved from hardware appliances installed on premises, to software running on end user devices ...
colonial

What We Can Learn from the Colonial Pipeline Breach

On June 8, 2021, Joseph Blount, President and Chief Executive Officer of Colonial Pipeline, appeared before the United States Senate Committee on Homeland Security and Governmental Affairs regarding the breach that injected ...
Pretty young lady taking a decision with scale above her head

Six Key Characteristics of a Modern ZTNA Solutions

Even as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while ...
COVID-19 Keeper Security work JumpCloud remote working work contact center

Remote Work Lessons Learned

To say that the world was unprepared for what happened in March of 2020 would be a gross understatement. Nobody needs a reminder of the seismic changes that the coronavirus pandemic introduced ...
Security Boulevard