
Sign up to save your podcasts
Or


Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems.
By N2K Networks4.6
309309 ratings
Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems.

186 Listeners

2,010 Listeners

6,028 Listeners

371 Listeners

372 Listeners

653 Listeners

1,028 Listeners

318 Listeners

418 Listeners

8,078 Listeners

177 Listeners

194 Listeners

73 Listeners

139 Listeners

167 Listeners