Posts Tagged 'SaaS'

The Intel Security Advanced Threat Research Team has discovered a critical signature forgery vulnerability in the Mozilla Network Security Services (NSS) crypto library that could allow malicious parties to set up fraudulent sites masquerading as legitimate businesses and other organizations. The Mozilla NSS library, commonly utilized in the Firefox web browser, can also be found […]

What does it take for a Software as a Service (SaaS) app to appear on the list of top Shadow IT offenders?  According to a recent survey, not much. Stratecast and McAfee conducted a survey with over 600 IT and Line of Business employees about their use of SaaS (authorized and unauthorized) in the workplace. […]

Most people we know are fairly dedicated, hard-working employees. They understand what their companies want from them, and they take pride in delivering on—or exceeding—the expectations. And yet, as revealed in the 2013 Frost & Sullivan SaaS survey sponsored by McAfee, employees regularly flout company policies when it comes to Software as a Service (SaaS) […]

This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In this and related posts, McAfee Labs researchers offer their views of new and evolving threats we expect to see in the coming year. This article was written by Ramnath Venugopalan. We foresee three broad threat […]

The numbers don’t lie—employees are increasingly circumventing IT, using unapproved Software-as-a-Service applications (SaaS) in their daily tasks. This dangerous habit, practiced by more than 80% of employees (known as Shadow IT), might seem harmless to some, but can, in fact, put sensitive corporate data at risk. Last week, Graham Clarke, the Senior Director of Network […]

It’s no irony that the most disruptive of innovative startups are some of the most attractive targets for cyber-attacks. It is indeed an irony that an emerging venture’s rush to get IT capabilities up and running could result in a significant number of security vulnerabilities. Consider this an issue of both culture and execution. Given […]