Computerworld May 9, 2024
Evan Schuman

The many IT risks associated with Shadow IT — and especially Shadow AI and Shadow IoT — are well-known and understandably well-feared. But there is a new form of Shadow IT on the horizon: “Sneaky IT.”

Shadow IT involves an end-user who bypasses IT and the enterprise security people and whips out a payment card to secure services elsewhere. That delivers a variety of unknown threats into the enterprise environment. But what happens when a trusted vendor adds new elements to its service — especially if it’s SaaS — and never mentions it? That poses a similar risk, both of which relate to environment visibility or, in the case of Sneaky IT, the absence of visibility.

This has...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: AI (Artificial Intelligence), Technology
UK Wants More Transparency Into AI Models
OpenAI Bosses: We Take Safety ‘Very Seriously’
Microsoft set to unveil its vision for AI PCs at Build developer conference
Mastering prompt engineering to elevate AI in clinical practice
AI-Guidance Boosts Arrhythmia Ablation Success in Persistent Cases

Share This Article