Use of “shadow IT” – applications, tools, or services that haven’t been approved or secured by an organization’s IT team – has become more ubiquitous across organizations.  But rather than banning the practice, enterprises should find a balance in regulating and allowing it, an ISACA primer released this week said. […]

Categories