Topic: shadow it

  • Employees Are Outsmarting Company Security Controls

    Employees Are Outsmarting Company Security Controls

    Rapid adoption of AI, SaaS, and personal devices is reshaping work, but traditional security measures like SSO and IAM are failing to keep pace, creating an "access-trust gap." Widespread AI usage sees 73% of employees using AI tools, yet over a third ignore guidelines, and 27% use unauthorized A...

    Read More »
  • LastPass Launches SaaS Protect to Combat Shadow IT & AI Threats

    LastPass Launches SaaS Protect to Combat Shadow IT & AI Threats

    LastPass launched SaaS Protect, a new solution to combat shadow IT and AI security threats by enabling active control over SaaS application access, building on its existing monitoring features. SaaS Protect offers real-time governance for SaaS apps, compliance reporting, and cost optimization by ...

    Read More »
  • Shadow AI vs. Managed AI: Kaspersky's META Region Analysis

    Shadow AI vs. Managed AI: Kaspersky's META Region Analysis

    A significant gap exists in the META region, where 81.7% of professionals use AI for work tasks, but only 38% have received formal cybersecurity training, increasing risks like data leakage. Despite high AI tool usage for tasks such as writing, email management, and data analytics, a third of pro...

    Read More »
  • The Hidden Danger of BYOD: Your Personal Device is the Weakest Link

    The Hidden Danger of BYOD: Your Personal Device is the Weakest Link

    A large majority of organizations globally use Bring Your Own Device policies, but only half formally authorize them, leading to significant security vulnerabilities in remote and hybrid work environments. Unsecured personal devices pose risks like data leakage, malware infections, and shadow IT,...

    Read More »
  • The Future is Passkeys: Say Goodbye to Passwords

    The Future is Passkeys: Say Goodbye to Passwords

    Passkeys are emerging as a more secure and user-friendly alternative to traditional passwords, simplifying access to online services while enhancing security. A hybrid environment of passwords and passkeys is expected to persist for years as businesses gradually update systems, with consumer adop...

    Read More »
  • Your Employees Are Leaking Secrets to AI—And They Can't Get Them Back

    Your Employees Are Leaking Secrets to AI—And They Can't Get Them Back

    Employees are increasingly inputting sensitive corporate data into public AI platforms, often without the ability to recover or delete it, and many organizations lack technical measures to monitor or restrict this behavior. A significant gap exists between leadership's perceived oversight and act...

    Read More »
  • 3 Metrics CFOs Use to Justify AI Spending Cuts

    3 Metrics CFOs Use to Justify AI Spending Cuts

    The focus of AI in business has shifted from general efficiency gains to demanding clear proof of tangible growth and competitive advantage, moving beyond basic productivity metrics like "time saved." To demonstrate AI's value, leaders must measure its impact through three key areas: **Quality Li...

    Read More »
  • Master Continuous Attack Surface Visibility: A Practical Guide

    Master Continuous Attack Surface Visibility: A Practical Guide

    Reliance on outdated, passive internet-scan data creates dangerous security blind spots, as it fails to keep pace with the dynamic, constantly changing nature of modern cloud infrastructure and assets. Continuous, automated reconnaissance is the necessary solution, involving daily active checks t...

    Read More »
  • Is Your Tech Stack Too Bloated?

    Is Your Tech Stack Too Bloated?

    The proliferation of AI and other marketing tools is creating a "marketing technology debt," where cluttered, disconnected software stacks waste budget and reduce productivity through complexity and underuse. Key warning signs of this problem include low team adoption, poor data integration, misa...

    Read More »
  • Google Now Shares Employee Text Messages With Employers

    Google Now Shares Employee Text Messages With Employers

    Google has introduced a feature allowing employers to intercept and archive all RCS and SMS/MMS messages sent from company-managed Android phones, fundamentally changing employee privacy expectations. This archival system works by integrating with the Google Messages app to log every message acti...

    Read More »