Blog | G5 Cyber Security

Information Security versus Shadow IT (and mobility, cloud computing, BYOD, etc.)

IT is getting harder to manage as a result of BYOD, cloud computing, IT consumerization, and mobility. As these trends perpetuate, CISOs find themselves in the proverbial hot seat. CISOs must explain the elements of risk-based granular security policies/enforcement to business managers. Security vendors like IBM, LogRhythm, Splunk, and 21CT are making a similar bet. The bad guys want to steal our data-at-rest and in-motion. Its back to basics here with data discovery, classification, and associated controls for specific data types.”]

Source: https://www.csoonline.com/article/2225710/information-security-versus–shadow-it—and-mobility–cloud-computing–byod–etc–.html

Exit mobile version