A new white paper advocates for improved information sharing among private sector firms, stressing the need for timely, relevant, and detailed threat information to mitigate cyberattacks, aid in system recovery, and enhance the resilience of commercial networks. […]

Use of “shadow IT” – applications, tools, or services that haven’t been approved or secured by an organization’s IT team – has become more ubiquitous across organizations.  But rather than banning the practice, enterprises should find a balance in regulating and allowing it, an ISACA primer released this week said. […]

Categories