While there may have been a time when IT organizations could dictate which devices and applications end users could use, employees are increasingly spending their own money to not only buy devices, but also contract to use software-as-a-service applications. Of course, sometimes the definition of their own money is fluid. They may not be using the IT budget, but in many instances they are using budget dollars allocated to the business unit they work for.
A new study from International Data Corp., conducted on behalf of Unisys, finds that this creates a lot of potential risk in the form of corporate data on any number of unmanaged devices and applications that are beyond the reach of most data governance policies. Coming down hard on this practice is not an especially savvy political move for most IT leaders. And most of them don’t have the internal expertise to manage these devices.
To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ... More >>
Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ... More >>
Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ... More >>