Risk Management Blog and Articles

September 20, 2022
embracing-shadow-it-blog

Should You Embrace Shadow IT?

While expanding the attack surface, Shadow IT can be both a risk and an opportunity for IT and security leaders. Here's why.
September 19, 2022
shadow it tips - managing shadow it

5 Tips for Managing Shadow IT

As employees work remotely, organizations need to minimize their blindspots. Make managing Shadow IT your first step.
September 15, 2022
shadow it and remote work

Remote Work and Shadow IT – How to securely support WFH policies

Does increased remote work mean increased risk? These are the areas you need to secure to prevent Shadow IT issues in remote work.
September 13, 2022
shadow it stats

15 Eye-Opening Shadow IT Stats You Need To Be Aware Of

The use of unsanctioned technology is growing rapidly. To thrive in this environment, you need to be aware of these Shadow IT stats.
September 12, 2022
building a shadow it policy

Building a Shadow IT Policy: What CEOs, CTOs, and CISOs Need to Know

As businesses move to the cloud and remote workers try to get things done, a Shadow IT policy is imperative to reduce risk.
September 9, 2022
cybersecurity education industry

Cloud-Based Attacks Targeting the Education Industry

47% of institutions in the education industry suffered a cyberattack on their cloud infrastructure within the last year. These tips can help.
September 1, 2022
thirdpartytrust bitsight acquisition blog

ThirdPartyTrust Announces Acquisition by BitSight

With ThirdPartyTrust joining the BitSight family, we offer an unequaled end-to-end TPRM solution that will strengthen vendor risk management.
August 31, 2022
top 5 cybersecurity stories

Top 5 Cybersecurity Stories of the Summer

Attackers gained access to the development environment through a compromised developer account. What does this mean for LastPass users?
August 29, 2022
lastpass compromised security incident

Password manager LastPass Compromised: Source Code Was Stolen

Attackers gained access to the development environment through a compromised developer account. What does this mean for LastPass users?