Securing Shadow IT Starts with Automation
Jason Short
Securing Shadow IT Starts with Automation

Shadow IT is a modern security challenge for the very best reasons – your users rely on it to find new and arguably innovative ways to be more productive. While getting more done more effectively isn’t a bad thing, rogue applications that aren’t supported and maintained by IT is. While we haven’t seen Shadow IT in the headlines as much recently, the problem remains very real. Gartner estimated 38%...

READ MORE
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance
Kim Ellery
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance

According to a recent survey, most people (71 percent) want their state and local governments to spend more money on preventative cybersecurity measures and even more people (74 percent) think officials should take steps to better secure constituents’ personal data. Constituent demand isn’t the only demand driver however. Compliance demands also illustrate state and local governments have their work cut out for them when it comes to bolstering security....

READ MORE
NIST Cybersecurity Framework: Third, Go Looking for Trouble
Josh Mayfield
NIST Cybersecurity Framework: Third, Go Looking for Trouble

Throughout this series, we’ve been exploring how a standard issue IT team can implement the NIST Cybersecurity Framework (CSF). Within the framework, there are five principle areas, what I call ‘pillars’, where IT and IT security teams can focus their attention to improve their cyber resilience. We looked at the first two pillars—identify and protect—in previous posts. Here, we can zero-in on the next step to NIST CSF success:...

READ MORE