According to the latest research from Gartner, worldwide spending on information security products and services will likely reach $81.6 billion in 2016.
Gartner predicts that within the next 4 years, one third of successful attacks on enterprises will be on Shadow IT resources. But we also know that clamping down on Shadow IT with draconian IT restrictions can often exacerbate the issue.
The Insider Threat already lives in the cloud. Right now, IT lacks visibility into the data being used in the cloud.
For years, organizations have been secured like fortresses, building walls around networks, applications, storage containers, and devices. But those walls crumble the moment they’re needed.
This week we cover cybersecurity at the Rio Olympics, ransomware as the canary in the mine, and the Wikileaks database.
These two new HIPAA settlements are meant to send a strong message about enforcement and accountability. The result for one of those cases was a record-setting settlement of $5.55 million.
The number of cloud apps in use across enterprises is soaring, and it was already a lofty number. On average, employees use 917 different cloud apps within a given enterprise organization.
What happens when IT purchases are made with the explicit permission of IT but without specific oversight? With proper planning and guidelines, decentralized IT does not need to lead to true Shadow IT.