Did you know:
Which collaboration and file sharing apps are most used by businesses?
What types of sensitive data are typically found in cloud sharing apps?
What % of shared documents have been compromised?
Which techniques are typically used to exfiltrate data?
What is the financial impact to organizations due to a cloud data breach?
Based on the analysis of over 63M documents, annoymized across the Elastica CloudSOC, the 2H 2015 Shadow Data Report answers these questions to provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Kathryn Cave looks at the big trends in tech
Rupert Goodwins’ unique angle on tech change
Phil Muncaster reports on China and beyond