Shadow IT

88% of Retail Organizations Vulnerable to Data Threats
88% of Retail Organizations Vulnerable to Data Threats

Target. Kmart. Home Depot. Neiman Marcus. Some of the biggest names in retail have been hit hard by data breaches in past years. Despite increased IT security spending, data breaches across all industries are accelerating. 88% of retail organizations in the US consider themselves vulnerable to data threats, with 19% experiencing a data breach in the past year, a figure which jumps to 43% for the global retail marketplace....

READ MORE
The Challenges of Shadow IT
The Challenges of Shadow IT

Shadow IT is a growing problem, and organizations must find the right balance of policy, processes and supporting technologies to get visibility into the data that’s living in the shadow. Here’s a look at the challenges — and how Absolute technology can help solve them…

READ MORE
Decentralization of IT Spending Puts Data at Risk
Decentralization of IT Spending Puts Data at Risk

Recent insights from IDC’s Worldwide Semiannual IT Spending Guide: Line of Business demonstrates that corporate IT spending by non-IT business units continues to rise. And it’s that decentralization that puts data at risk. Here’s an overview — and insights on how to address it…

READ MORE
The Growing Challenges in Combating Shadow IT

Shadow IT is a huge and growing problem. Organizations must find the right balance of policy, processes and supporting technologies in order to regain visibility into the endpoint and the cloud where data is living in the ‘Shadow,’ all without becoming overtly restrictive and re-enforcing the negative-yet-well-meaning behavior that led to the growth of Shadow IT in the first place! IT Business Edge polled a series of security leads...

READ MORE
Seeking Clarity for IoT
Seeking Clarity for IoT

When it comes to IT acronyms and technical jargon fly fast and free. We’re always looking for a new way to name things, it seems. Shadow IT. Shadow Data. IoT. Shadow IoT. Security of Things. The desire for clarity through naming conventions can overshadow the message. When it comes down to it, most of the conversations are actually the same. It’s about data security. And it’s also about reputation management....

READ MORE