Managing Shadow IT

“Shadow IT,” or solutions not specified or deployed by the IT department, now account for 35 percent of enterprise applications. Research shows an increase in IT shadow spend with numbers projected to grow another 20 percent by the end of 2015. Experts agree that shadow IT is here to stay, particularly the growing tendency to […]

Continue Reading

Is the Internet of Things safe? New ISACA Survey Shows Significant Perception Gap

As global use of connected devices–including those used for life-saving purposes—grows, a new survey from ISACA shows that there is a significant confidence gap between consumers and cybersecurity and IT professionals. In fact, while 64% of US consumers say they are confident they can control information conveyed through Internet of Things (IoT) devices, 78% of […]

Continue Reading

National Cybersecurity Awareness Month: YOU Have the Power to Change Cybersecurity

National Cybersecurity Awareness Month in October is the perfect time to reflect on what you’re doing to overcome the cybersecurity skills shortage. That’s right – you – personally. According to Dr. Jane LeClair, COO for the National Cybersecurity Institute at Excelsior College, the cybersecurity skills shortage is everyone’s problem, and we all have a responsibility […]

Continue Reading

The Cybersecurity Canon: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  […]

Continue Reading
%d bloggers like this: