top of page

Server? What server? Site forgotten for 12 years attracts hacks, fines

I cannot understate the danger of shadow IT.  It bypasses security processes, testing procedures, tools, patching mechanisms and almost everything else in place to properly defend an organization.  This article is a cringe worthy example.


Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page