Security What’s lurking in the shadows? How to manage the security risks of shadow IT by Phil Muncaster by Phil Muncaster Employee use of unsanctioned hardware and software is an increasingly acute problem in the… 0 FacebookTwitterPinterestEmail