c
Jan. 4, 2022, 3:52 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

Written by David Golding, AppOmni. Anyone in IT is familiar with shadow IT. How many times has an IT manager been surprised by the number of unknown applications that connect to their network? Shadow IT isn’t a new challenge, but the ability to keep track of unsanctioned IT has become more difficult with the rapid worldwide shift to remote work. Along with that comes the challenge of securing shadow IT.I was curious: how did the sudden explosion of remote work …

people process shadow shadow it technology

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Architect III

@ JPMorgan Chase & Co. | Columbus, OH, United States

Senior DevSecOps Engineer

@ Marlabs | Chennai, IN

Consultant Cyber Sécurité H/F

@ Hifield | Lyon, France

Cyber Security Consultant (Remote, US)

@ Crosslake Technologies | Remote (US)

PE Hub- SAP GRC/ IAG Consultant

@ SAP | Bengaluru, IN, 560066