In this byline opinion article, Scott Hesford discusses how organisations needs to understand what shadow IT is and the risks it represents before finding a path forward to mitigating its potential impact on an enterprise. Knowing which devices have access to the network, and which users have access to privileged credentials is an important first step to defending against shadow IT threats. Outside of PAM, a refocus on IT policies may also be required to rein in shadow IT use.

Read the full story here:

Prefers reduced motion setting detected. Animations will now be reduced as a result.