Shadow of hot-air balloon over the Namib desert. Namib-Naukluft Park, Namibia
Cyber RiskTo Map Shadow IT, Follow Citizen DevelopersTo Map Shadow IT, Follow Citizen Developers
The tangle of user-built tools is formidable to manage, but it can lead to a greater understanding of real-world business needs.
byJeffrey Wells, Visiting Fellow, National Security Institute at George Mason University's Antonin Scalia Law School
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.