Artwork
iconShare
 
Manage episode 524314509 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Enjoying the content? Let us know your feedback!

Imagine discovering that your organization is running nearly ten times more applications than your IT team knows about. Imagine learning that two out of every three cloud tools being used by your employees were never approved, never vetted for security, and are completely invisible to your monitoring systems. Now imagine that one-third of all data breaches last year involved exactly these kinds of hidden applications. This isn't a hypothetical scenario from some dystopian cybersecurity future—this is happening right now in organizations of every size, including yours. Today, we're talking about Shadow IT and SaaS sprawl, the security crisis that's hiding in plain sight, costing companies millions, and creating vulnerabilities that most security teams don't even know exist yet.

- https://csrc.nist.gov: NIST Special Publication 800-53 - Security Controls for Shadow IT

- https://www.ibm.com: Data-breach

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

  continue reading

253 episodes