Shadow IT comprises tools, scripts and applications deployed without formal IT approval, says Andrzej Jarmolowicz, operations director at Cybershure.
Timeline
2025
November
- 5.
October
- 2.To counter threats like Charon, companies must move beyond reactive patching and adopt continuous threat exposure management, says Andrzej Jarmolowicz, operations director at Cybershure.
September
- 9.CTEM continuously detects, prioritises, validates and remedies security exposures in real-time, says Andrzej Jarmolowicz, operations director at Cybershure.
February
- 19.CyberCyte’s MDR platform focuses on threat hunting and asset attack surface management to identify vulnerabilities and potential risks.
- 13.Labyrinth Security Solutions specialises in cyber deception technology.
