Artificial intelligence ceased to be a distant promise to become a daily tool within many companies. From assistants integrated into productivity suites to browser extensions, copilots within SaaS applications and small personal employee projects, the IA is deployed at points that traditional controls did not come to foresee. The problem today is not that IA tools are missing, but that there is a lack of visibility and control over how, when and with what identity they are used.
This gap between adoption and governance creates what many already call "shadow AI": unregistered uses, anonymous or mixed sessions that jump above corporate controls. Security equipment still depends in many cases on solutions designed for the network world and monolithic applications: firewalls, proxies and DLP systems designed to detect data flows at the network or application level. But the reality is that many interactions with IA occur in the browser, in extensions or in agents that chain services without going through the usual filters. The result is a governance gap where the risk grows faster than the ability to monitor it.

It's not just about "watching over." To manage the IA with criteria you have to understand the nature of the interaction: what is written in a prompt, what is uploaded to a model, what identity is involved, and what automatic steps happen next. That nature makes security is no longer just a matter of data or applications and becomes a problem of interaction. In other words, it is not enough to know what tools exist in the company; it is necessary to check what happens at the precise moment when a worker interacts with an IA.
This is why new proposals and technological categories are emerging, oriented towards what has begun to be called AI Usage Control (AUC). These solutions try to operate exactly where interactions occur: they discover real-time points of use, correlate sessions with identities (corporate or personal) and apply measures that go beyond the total block. Instead of a binary switch, they offer more subtle options such as automatically writing sensitive information, warning the user at the time of action or allowing operations with contextual restrictions.
Implementing such an approach requires changing the mental framework. The first stage is the discovery: to chart a true inventory of where the IA appears in the organization, including extensions and agents that do not appear in traditional inventories. But that inventory is not the ultimate objective; it is the starting point. What makes the difference is the ability to understand interaction in real time: to distinguish a harmless prompt from a sensitive data increase, to understand whether a session corresponds to an employee or a personal account, and to evaluate conditions such as the position of the device or the place from which it is accessed.
Effective management also requires adaptive controls. Effective policies are not static lists of allowed and blocked; they are rules that are applied according to context and identity, capable of masking or limiting outputs rather than cutting the productive flow. This flexibility allows safety to accompany productivity rather than deal with it, and prevents workers from quickly seeking "shortcuts" that generate even more Shadow AI.
There are also practical factors that decide whether a governance technology is adopted or left in a pilot. The ease of deployment, the minimum friction for the user and the ability of the supplier to evolve quickly are as important as technical robustness. A powerful but intrusive control ends up being neutralized by users; a solution that needs weeks of adjustment on each endpoint rarely scale. The architecture must be integrated into the actual workflow and applied where interactions occur, without imposing large operational burdens.
It is understandable that organizations try to recycle existing tools: adding rules to a CASB, relying on DLP or tracking network traffic seem natural shortcuts. However, many of these approaches fail because they do not capture the complexity of modern IA sessions: mixed identities, agents that orchestrate several APIs and actions that do not generate easily attributable traffic. That is why the conversation has begun to move towards specific models of use governance, with approaches that combine detection, context and control in real time.
For those who lead security in a company, this means reviewing priorities. Rather than deploy another tool, we need to rethink the control architecture: identify the points of interaction, require identity and session correlation, and choose intervention mechanisms that protect without paralyzing. Resources such as the NIST framework on risk management in IA provide useful principles for guiding strategic decisions ( NIST AI), and entities such as CISA offer materials to understand threats and best practices at the crossing between cybersecurity and IA.
It is also appropriate to look at community initiatives to identify emerging risk vectors; for example, projects that catalogue specific threats to language models help to understand attacks and vulnerabilities specific to this technology ( OWASP Top 10 for LLMs). And for teams looking for practical evaluation frameworks aimed at governing the use of IA in the company, there are sectoral guides and technical materials that present criteria for choosing solutions that really act at the point of interaction.

Not everything is technological: effective governance also requires internal policy, training and a clear dialogue with business units. The best technical solutions are short if teams continue to view IA as a black box or if corporate standards prohibit desirable uses without offering safe alternatives. The aim should be to allow innovation with smart limits, not to stifle productivity out of fear.
If what an organization is looking for is to start assessing options, there are introductory materials and purchase guides that explain what capabilities are critical - real-time detection, identity correlation, adaptive controls and an architecture that does not depend on complex traffic routes. An example of such resources is the Buyer's Guide for AI Usage Control which proposes a framework for distinguishing marketing from real value and prioritizing scalable solutions. For those who want to deepen the practices of discovery and mitigation of Shadow AI, there are also training activities and online events where practical cases are discussed, such as the virtual lunch and learn about Shadow AI.
In short, the adoption of IA in the company is no longer a marginal choice: it is a fact that redefines processes and risks. The answer is no longer rigid rules, but controls that understand and act at the time of interaction., which can distinguish between legitimate use and actual exposure, and which are integrated without friction into the user's experience. The organizations that take on this architectural change will be in a better position to take advantage of the IA without sacrificing security or compliance.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...