The massive deployment of writing assistants with IA, code copies and extensions that summarize meetings has turned a beneficial work practice into a silent risk for many companies: what I call Shadow AI, the widespread use of IA tools outside the control and visibility of security equipment. Far from being a curious problem, today these are daily processes: employees who install utilities to be more efficient and unintentionally open doors to sensitive corporate data.
Much of the risk comes from how these applications are integrated with corporate platforms. Many request access by OAuth to Google Workspace or Microsoft 365, act as browser extensions or activate IA capabilities included within tools already approved by the company. These connections do not always go through the channels that traditional solutions monitor, because they do not go through the corporate network or generate traffic that a firewall or IDS easily identify. Google maintains documentation on third-party application management and OAuth permissions that well illustrates this kind of exposure https: / / support.google.com / a / ansher / 7281227? hl = en.

Sector studies and surveys confirm the magnitude of the phenomenon: a significant part of the staff uses unapproved IA applications and few organizations have comprehensive governance policies. This gap creates a disconnection between how the equipment works and what the security area can see, with consequences ranging from accidental leakage of confidential information to regulatory problems when personal data or business secrets are exposed to third parties or, worse, incorporated into the training of external models without control.
The practical implications are not theoretical: introducing source code fragments, customer data or financial reports in a public prompt may lead to loss of intellectual property, non-compliance with contracts or sanctions by sectoral regulations. In addition, the evolution of suppliers makes a previously harmless tool able, after an update, to change how data is treated; it is therefore critical that governance is not a timely event but a continuous process.
The realistic starting point is the discovery. Audit OAuth connections, review the list of applications with access to critical platforms, and analyze the active extensions in the organization's browsers throw the initial risk map. In addition, a direct survey among employees is needed: many tools appear because people seek immediate solutions and open dialogue often reveals uses that automatic detections do not capture. In parallel, recording and classifying which data should never enter an IA tool (e.g. sensitive personal data, access keys, critical source code) is a basic risk management measure that avoids ambiguities.
The policy of use of IA should be designed as a practical guide, not a punitive list. It is essential to publish a list of approved tools, require the supplier to confirm that corporate data are not used to train models (or that there is an explicit opt-out business option), and to describe clearly and in plain language the process to request new tools with a commitment of response time. Understanding why behind the rule - which risk prevents each rule - improves adherence and turns policy into continuing education.
So that the teams don't look for shortcuts, we have to build a fast lane for the assessment of low risk tools: structured forms, evaluation criteria (access to data, supplier security practices, certifications) and agile decisions that reduce friction. At the same time, publishing and keeping up-to-date the list of approved tools reduces the incentive to use external solutions and makes it easier for employees to choose the safe option.

The detection and operational protection also matter: browser-based monitoring - which observes integrations and extensions without forcing the rerouting of all traffic - offers immediate visibility on IA activity in the endpoint. Integrating these signals into the risk profile of each user, along with classic indicators such as phishing simulations and formative compliance, allows prioritizing interventions where hazardous behaviors are concentrated. Complementing this visibility with technical controls such as DLP, conditional access policies and, where appropriate, CASB or browser isolation exponentially reduces the leakage surface.
Finally, security works best when it is simple and contextual: coaching just in time- short messages that appear at the time an employee tries to use an unapproved tool - and the training that explains the reasons behind the rules creates long-term useful judgment and habits. The governance of IA should be seen as a productivity enhancer: when teams find safe and fast routes to access useful tools, the Shadow AI is reduced organically.
Manage the adoption of IA requires a mix of technical mapping, understandable policies, agile processes and controls that do not hinder daily work. The regulatory and technical community already offers frameworks and recommendations that can be adapted: the National Institute of Standards and Technology (NIST) publishes resources on IA risk management that serve as a reference for designing corporate controls and policies https: / / www.nist.gov / ai. Combining these guides with permit audits and concrete practices on platforms such as Google Workspace or Microsoft 365 allows you to transform the productive impulse of the IA into real value, without turning efficiency into an exposure vector.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...