Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Tesla’s fourth “master plan” reads like nonsense generated in LLM

Lazarus Group extends malware arsenal with Pondrat, Themeforestrat and Remotepe

Humanity raises a $13 billion Series F at a valuation of $183 billion

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » An important part of enterprise AI governance
Identity

An important part of enterprise AI governance

userBy userSeptember 2, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 2, 2025Hacker NewsData Privacy / SaaS Security

Shadow AI Discovery

The harsh truth about AI adoption

The MITS State of Business Report revealed that 40% of organizations purchase enterprise LLM subscriptions, while over 90% of employees actively use AI tools in their daily operations. Similarly, a Harmonic Security study found that 45.4% of sensitive AI interactions come from individual email accounts.

This, of course, has raised many concerns about the growing “Shadow AI Economy.” But what does that mean and how can security and AI governance teams overcome these challenges?

Contact Harmonic Security to learn more about Shadow AI discoveries and enforce our AI usage policy.

The use of AI is driven by employees, not committees

Companies misuse AI use as a top-down defined by visionary business leaders. We know that’s wrong now. Most often, employees promote adoption from the bottom up without oversight, but the governance framework is still defined from the top down. Even if you have an enterprise certified tool, you often avoid these in favor of other new tools that are well placed to increase productivity.

Unless security leaders understand this reality, reveal and control this activity, they put their business at serious risk.

Why blocks fail

Many organizations have sought to address this challenge with a “block and wait” strategy. This approach limits access to well-known AI platforms and slows adoption.

The reality is different.

AI is no longer a category that can be easily fenced. From productivity apps like Canva and Grammarly to collaborating tools with embedded assistants, AI is woven into almost every SaaS app. Blocking one tool often drives employees to another tool through personal accounts or home devices, blinding the enterprise to actual use.

Of course, this is not true for all businesses. Forward Heaven Security and AI Governance Teams are actively trying to understand what employees are using and which use cases they are using. They are trying to understand what is going on and how to help employees use the tools as safely as possible.

Discovery of Shadow AI as a Governance Instruction

AI asset inventory is a regulatory requirement and is not a great one. Frameworks like the EU AI Act explicitly require organizations to maintain visibility of AI systems in use, as they are out of stock without discovery and there is no governance without stock. Shadow AI is a key component of this.

Various AI tools pose different risks. Some quietly train their own data, while others store information sensitive to jurisdictions like China and create intellectual property exposures. To comply with regulations and protect your business, security leaders must clarify the full scope of AI usage across first approved enterprise and unauthorized personal accounts.

Armed with this visibility, organizations can separate low-risk use cases from sensitive data, regulated workflows, or those with geographical exposure. Only then can we implement meaningful governance policies that protect our data and enable our employees to be productive.

How harmonic security can help

Harmonic Security enables this approach by providing intelligence control for employees to use AI. This includes ongoing monitoring of Shadow AI with off-the-shelf risk assessments for each application.

Instead of relying on static block lists, Harmonic provides visibility for both authorized and unauthorized use, enforcing smart policies based on data sensitivity, employee roles, and the nature of the tool.

This means that while marketing teams may be allowed to enter certain information into certain tools for content creation, HR or legal teams are restricted from using personal accounts of sensitive employee information. This is supported by a model that allows employees to identify and classify information when they share data. This allows teams to enforce AI policies with the required accuracy.

Shadow AI Discovery

The road ahead

ShadowAi stays here. As more SAAS applications incorporate AI, unmanaged usage will only expand. Organizations that cannot deal with discoveries today will find themselves unable to govern tomorrow.

The path to advance is to intelligently dominate rather than block it. Shadow AI Discovery gives CISOs the visibility they need to protect sensitive data, meet regulatory requirements, and enable employees to safely harness the productivity benefits of AI.

Harmonic Security is already helping businesses take this next step with AI governance.

For CISOs, it’s no longer a question of whether employees are using Shadow AI…it’s whether you can see it.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Google News, Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUkrainian Network FDN3 launches massive brute force attacks on SSL VPN and RDP devices
Next Article Researchers warning MyStrodx backdoor using DNS and ICMP triggers for Stealthy Control
user
  • Website

Related Posts

Lazarus Group extends malware arsenal with Pondrat, Themeforestrat and Remotepe

September 2, 2025

Researchers warning MyStrodx backdoor using DNS and ICMP triggers for Stealthy Control

September 2, 2025

Ukrainian Network FDN3 launches massive brute force attacks on SSL VPN and RDP devices

September 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Tesla’s fourth “master plan” reads like nonsense generated in LLM

Lazarus Group extends malware arsenal with Pondrat, Themeforestrat and Remotepe

Humanity raises a $13 billion Series F at a valuation of $183 billion

WordPress unveils Telex, an experimental AI development tool

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.