Latest Articles

October 27, 2022
Cybersecurity Awareness Month

7 Tips to Prevent Phishing and Business Email Compromise

Get the top tips to spot malicious emails and prevent phishing, ransomware, and other malware attacks in the business network.
October 4, 2022

VRM and TPRM: What’s the difference?

We compare VRM and TPRM in the context of understanding and reducing the inherent risk of dealing with vendors and third parties.
September 27, 2022
shadow it risks

5 Shadow IT Risks to Address

The use of unsanctioned technologies can create different types of Shadow IT risks. Here's how to keep your network safe.
September 20, 2022
embracing-shadow-it-blog

Should You Embrace Shadow IT?

While expanding the attack surface, Shadow IT can be both a risk and an opportunity for IT and security leaders. Here's why.
September 19, 2022
shadow it tips - managing shadow it

5 Tips for Managing Shadow IT

As employees work remotely, organizations need to minimize their blindspots. Make managing Shadow IT your first step.
September 15, 2022
shadow it and remote work

Remote Work and Shadow IT – How to securely support WFH policies

Does increased remote work mean increased risk? These are the areas you need to secure to prevent Shadow IT issues in remote work.