Vos employés utilisent sûrement des outils non approuvés — sans mauvaise intention, juste pour faire leur travail.

Dans le dernier épisode, on a parlé shadow IT, shadow AI et gestion des risques en PME avec Cyndie Feltz, Nicolas Milot et Dominique Derrier.

La vraie question avec l'IA : c'est pas "si" vos employés l'utilisent, c'est "comment l'encadrer".

🎧 Web: https://polysecure.ca/posts/episode-0x721.html#cabfa0a3
🎧 Spotify: https://open.spotify.com/episode/365I6KyLponG6wEN4HdvbW?si=dSeNJ0khQo-J8JvDxUqXNQ
🎧 YouTube: https://youtu.be/3jvB30VsXOY

#CyberSécurité #ShadowIT #PME

A recent Pentagon vendor cutoff exposed how many enterprises silently rely on hidden AI tools—think Claude, SDKs, and automated agents tucked away in Shadow IT. The fallout raises urgent questions about security, compliance, and true AI independence. Dive into the details to see what your organization might be missing. #AIDependencies #PentagonVendor #ShadowIT #EnterpriseSecurity

🔗 https://aidailypost.com/news/pentagon-vendor-cutoff-reveals-hidden-ai-dependencies-enterprises-lack

Is your "strategy" just a collection of manual spreadsheets? We call this Shadow Data Collapse. When the one person who understands the macros leaves, your "insights" go with them. Stop managing liabilities and start fixing the process.

​Measure your friction before the collapse:
https://shaolindataservices.com/#diagnostic

​#DataStrategy #ShadowIT #Ops #ShaolinData #Analytics

SDS | SOVEREIGN DATA INTELLIGENCE

Kinetic intelligence and forensic data diagnostics for high-stakes operational theaters.

OpenClaw just hit 160 000 ⭐ on GitHub, showing how shadow‑IT tools are becoming mainstream. Its AI‑driven local agent lets users bypass corporate controls, raising fresh enterprise‑security questions. How should orgs respond to unauthorized software and shifting user permissions? Dive into the analysis. #OpenClaw #ShadowIT #AIAGENT #EnterpriseSecurity

🔗 https://aidailypost.com/news/openclaw-hits-160000-github-stars-shadow-it-becomes-new-normal

AI “shadow IT” is here. Researchers found ~175K publicly exposed Ollama hosts across 130+ countries, many with tool-calling & no auth—perfect targets for “LLMjacking” and abuse. #Cybersecurity #LLMSecurity #AIsecurity #CloudSecurity #Ollama #ShadowIT 🔗 https://zurl.co/oZU16

🕵️‍♂️ Shadow IT: Hidden Risk
Unapproved apps can expose data and create compliance gaps. Improve visibility and provide secure alternatives. 🔐

#CyberSecurity #ShadowIT #DataProtection #InfosecK2K

Security researchers discovered 1,862 Moltbot AI assistant servers exposed without authentication on the internet. The viral GitHub project requires access to emails, messages, banking, and system commands to function. 22% of enterprise customers have employees running it without IT approval, creating shadow AI deployments with full privileges. Supply chain attack tests compromised 16 developers across 7 countries within 8 hours. #AISecRisk #ShadowIT #SecurityResearch

https://www.implicator.ai/moltbot-punched-through-every-security-wall-attackers-followed/

Moltbot Punched Through Every Security Wall. Attackers Followed.

Researchers found 1,862 Moltbot servers exposed without authentication. The viral AI assistant stores credentials in plaintext and invites attack by design.

Implicator.ai

Adventures in Uptime: The Desk Production Server #13

You haven't known fear until you've been asked to "just reboot a PC" and discovered it's actually a production server that has lived under a desk for years.

"Enterprise-grade infrastructure" sometimes just means a desktop tower with a "Do Not Unplug" sticky note. 😅

The full story is available on my blog: https://alexnuttinck.dev/posts/adventures-in-uptime/13-the-desk-production-server/

#AdventuresInUptime #DevOps #Sysadmin #ShadowIT #TechHumor

Finding out the sales team spent millions on a server because, well, 'storage,' is exactly the kind of surprise that keeps tech folks on their toes.

Find out more in Episode 9 - Shadow IT Reports

https://youtube.com/shorts/WAvQlBR08UU

#podcast #tech #techlife #ithumor #shadowit #cybersecurity

Listen to our podcast on :

Spotify : https://open.spotify.com/show/7LqbtykS0IQctSCucvQVHW
Apple Music : https://podcasts.apple.com/us/podcast/it-horror-stories-with-jack-smith/id1812612272
YouTube : https://music.youtube.com/playlist?list=PL9A9yzpnkOdVQvmFjgTsZRrE-zDCuIVcX
Deezer : https://link.deezer.com/s/30dyH3RoKvN8N24zgsbhj

Buying hardware on the sales budget

YouTube

You think your IT is under control, then suddenly realize half the business has their own secret apps running. Didn't see that coming, did you?

Find out more in Episode 9 - Shadow IT Reports

https://youtube.com/shorts/EL5FPj-xdLU

Spotify : https://open.spotify.com/show/7LqbtykS0IQctSCucvQVHW
Apple Music : https://podcasts.apple.com/us/podcast/it-horror-stories-with-jack-smith/id1812612272
YouTube : https://music.youtube.com/playlist?list=PL9A9yzpnkOdVQvmFjgTsZRrE-zDCuIVcX
Deezer : https://link.deezer.com/s/30dyH3RoKvN8N24zgsbhj

#podcast #tech #techlife #ithumor #shadowit #cybersecurity

What is Shadow IT ?

YouTube