Shadow IT Feeds ‘Man in the Cloud’ Attacks
As the number of devices connected to company networks increases, the ability of traditional security solutions to counter threats will decrease, noted Morgan Gerhart, VP of product marketing for Imperva. “Consumerization of IT and BYOD are accelerating the rate at which traditional endpoint and network solutions are becoming blind to the kinds of threats that are out there.”
By John P. Mello Jr.
Shadow IT — the use of unauthorized online services by company employees — is a concern of cyberwarriors charged with defending business systems against network attacks. There’s new evidence that those concerns are justified.
A new attack vector on business systems leverages the synchronization features of services like Dropbox and Google Drive to perform malicious mischief, according to a report Imperva released earlier this month at the Black Hat Conference in Las Vegas.
To read the entire article, please click here.