computer code

Shadow IT: The hidden danger

Shadow IT, a term that just sounds insidious. Surely it is something that governments use as a tool for state-sponsored cyber wars, right? The term suggests hidden technologies, lurking in the background. …

Read More

A framework for cybersecurity

(Post 8 of the 12-week Information Security Management blog series) Starting and managing a cybersecurity program can seem incredibly confusing and even overwhelming. Wading through several hundred pages of guidance and standards can …

Read More