IT

Germany offers Cybersecurity Labels for mobile devices

Since August 14, 2024, the Federal Office for Information Security (BSI) in Germany has begun issuing security labels for IT devices. These labels provide a snapshot of the security level that users can expect from their devices. In today’s digital age, smartphones and tablets used in corporate settings handle and store vast amounts of sensitive […]

Appeasing the Oasis of Unknown: Shadow IT Discovery

This post was originally published by Samantha Nguyen. In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search […]

Glass Class: Mitigating Risk before Shadow IT

This post was originally published here by Will Houcheime . In today’s cloud-first world, employees are sometimes trusted to manage their own projects, giving them freedom to work with the tools of their choosing to complete their tasks. Occasionally, these tools are cloud applications that organizations are not made aware of, making them a security risk […]

IT security sucks

It’s rare to find a bunch of people who agree on anything. It’s even rarer when you find a bunch of people who agree that they all suck. Welcome to a rare situation. A few weeks ago, I spoke at the AWS re:Invent conference in Las Vegas. In my audience were hundreds of IT professionals. Some were […]

Share this page