Tag

shadow it

What We Can Learn From the DocuSign Breach

What We Can Learn From the DocuSign Breach
With over 200 million users in 188 countries, DocuSign is one of the most widely-adopted cloud applications in the enterprise today. Given…

Well-Known Hacking Group Exploits Third-Party Apps and OAuth

Well-Known Hacking Group Exploits Third-Party Apps and OAuth
What do the DNC hacks and the current attempts by hackers to interfere with the French election have in common? Give up?…

Better Together: Cisco and CloudLock Integration to Combat Shadow IT

Better Together: Cisco and CloudLock Integration to Combat Shadow IT
Since the closing of the CloudLock acquisition by Cisco, the CloudLock and Cisco teams have joined forces to accelerate our vision to…

The Explosion of Apps: 27% are Risky

The Explosion of Apps: 27% are Risky
Continuing to deliver mind-blowing insights from cutting-edge cybersecurity research, CloudLock CyberLab, our security intelligence arm, launches the Q2 Cybersecurity Report at The…

Shadow IT in Under 5 Minutes

Shadow IT in Under 5 Minutes
Shadow IT describes the notion that organizations have users and employees that are utilizing applications that are not necessarily sanctioned and are being…
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close