Skip to main content

Posts about Shadow IT

How to spot an open door to your network.
What is External Attack Surface Management (EASM) and How Can You Secure It?

Taking Cybersecurity Beyond the Obvious with EASM In 2005, a group of about 25 people posing as landscapers tunneled into the vault of the Banco Central bank in Fortaleza, Ceará, Brazil, making off with approximately US$71M. It was the largest bank robbery in Brazil’s history and, despite the lack of a cybersecurity breach, it’s also […]

Left to right: U.S. House Speaker Nancy Pelosi, Pfizer CEO Albert Bourla and CybelAngel CEO Erwan Keraudy
An International Cybersecurity Collaboration Like No Other

CybelAngel CEO Erwan Keraudy advances EASM and preemptive cybersecurity with distinguished US and French cybersecurity delegation The French-American Foundation’s 2022 Cyber Security Conference, held November 29 to December 1, brought together nearly 100 leading cyber security experts and thought leaders from France and the U.S. to discuss the most pertinent cyber security challenges from both […]

The road to shadow IT is paved with good intentions
How to Manage the Risks and Costs of Shadow IT

Do your employees use personal drives to store or share corporate data? Do they forward corporate files to their personal email? Perhaps they’ve created repositories for document gathering and sharing for a joint project with a vendor…or installed a handy little app or extension they found online… If so, congratulations: You’ve probably got shadow IT. […]

Is it time for a preemptive cybersecurity posture?
Is it Time for a Preemptive Cybersecurity Posture? Ask These 5 Questions…

Every day, we see more global turmoil. Geo-political unrest, economic slowdowns, rising inflation and supply chain issues…it seems there is more uncertainty than ever before. Add to this, business shifts between ‘work from home,’ ‘back to the office,’ ‘stored in the cloud’ and ‘bring your own device,’ and the picture quickly gets complicated.  This level […]