Tags Shadow IT

How identity can control shadow IT

by CyberScoop Staff • 3 years ago

By focusing on identity management, IT departments are able to simplify access to cloud applications, making them more secure.

How identity can control shadow IT

by CyberScoop Staff • 3 years ago

By focusing on identity management, IT departments are able to simplify access to cloud applications, making them more secure.

DHS cyber tool finds huge amount of 'shadow IT' in U.S. agencies

by Shaun Waterman • 3 years ago

New cybersecurity tools being deployed across the U.S. government found huge numbers of uncatalogued and unmanaged computer devices connected to federal networks — a phenomenon known as "shadow IT" — that necessitated urgent modifications to many hundreds of millions of dollars worth of contracts.

TwitterFacebookLinkedInRedditGoogle Gmail