<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1838014323211965&amp;ev=PageView&amp;noscript=1">

Blogs



Your go-to resource for navigating the challenges of disconnected applications and enhancing security automation. Dive into actionable advice, innovative solutions, and the latest cybersecurity trends to keep your enterprise secure and ahead of the curve.

Cerby-Wifi-logo
Cerby-megaphone-logo
Cerby-messages-logo
Cerby-Blog-Giro
Cerby blog
| Sep 15, 2022
When the pandemic hit, existing workplace practices and operations began an immediate transformation. Now, as we enter a post-pandemic era, we can begin to assess how organizations and their employees both fared and altered.
Company
Cerby blog
| Sep 12, 2022
Application choice: choosing the productivity and efficiency applications of your choice without security or IT approval in the workplace. Today, the majority of employees want full control over application choice, but many of those applications aren’t...
Security
Cerby blog
| Sep 6, 2022
Unmanageable applications: a new category of applications becoming increasingly challenging for businesses to manage and secure effectively, yet increasingly critical for businesses to succeed. Today, most organizations use apps to streamline processes...
Security
Cerby blog
| Aug 31, 2022
The COVID hangover: the lingering effects of a “make it work” mentality organizations adopted in response to the COVID-19 pandemic.
Industry insights
Cerby blog
| Aug 22, 2022
How employees use applications for work is changing. In the wake of COVID-19, the shift to remote work and rapid digitization empowered people to work however they wanted. Left to their own devices, employees started using the applications they...
Security
Cerby blog
| Aug 3, 2022
What are unmanageable applications? Unmanageable applications are a class of applications defined by their lack of support for common identity and security standards. While Shadow IT can refer to any application used without IT and security approval,...
Security
Cerby blog
| Jul 8, 2022
One of the biggest challenges marketers often face is protecting their ad spend across social media.
Security
Cerby blog
| Jun 27, 2022
Today, we are announcing a milestone in our journey: a $12 million seed funding round from Ridge Ventures, Bowery Capital, Okta Ventures, Salesforce Ventures, and others, bringing total funding to $15.5 million. Approaches for dealing with shadow IT are...
Security
Cerby blog
| Jun 27, 2022
How does it make you feel when you are told you can only do something only if you do it a certain way with a very defined set of tools? If you are like me, you probably don’t like it, and it might even leave you feeling like you aren’t trusted. Welcome...
Security