CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Shadow IT
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Shadow IT

Employees working and communicating with Shadow IT
Cyber SecurityInsights

How Shadow IT Is Undermining Your Work Culture – And What To Do About It

December 4, 2020
Use of Shadow IT by employees for communications can harm an organization’s security and its culture. It also signals to employers that something is not working.
Read More
Businessman using notebook showing SaaS and shadow IT
Cyber SecurityInsights

Software May Be Eating the World and Your IT Budget

December 13, 2022
The economic landscape requires due diligence when it comes to enterprise level SaaS spending. Shadow IT hides wasteful spending, and organizations must manage costs associated with bulky and hidden SaaS platforms.
Read More
Man working on laptop against sunny window showing shadow IT
Cyber Security

Emerging From the Shadows With Good Shadow IT

November 15, 2022
Many IT professionals are also starting to recognise the ability of Shadow IT to maximise operations; IT departments now set aside 40% of its enterprise budget for Shadow IT and this is only going to increase.
Read More
Man working on laptop at home showing the security risks of Shadow IT in remote working
Cyber SecurityInsights

Recovering from the Shadow IT Pandemic

June 23, 2020
Companies are facing a new “shadow IT” pandemic during COVID-19 as employees are finding their own solutions to information technology problems that often violate existing security policy.
Read More
Hand on keyboard with cloud icon on monitor screen showing SaaS and shadow IT
Cyber SecurityInsights

Shadow SaaS Is on the Rise in the Hybrid Work Era; Here’s How To Regain Control

July 29, 2021
IT security teams need to develop a SaaS management strategy to mitigate and address their shadow applications to mitigate the security and compliance risks shadow IT poses to their organizations.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results