home.social

#shadowai — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #shadowai, aggregated by home.social.

  1. 5 000 apps vibe-codées exposées, et le parallèle avec les buckets S3 mal configurés des débuts du cloud est saisissant. Chaque nouvelle vague d'outils génère sa propre vague de surface d'attaque. L'IA abaisse la barrière à la création — mais pas encore à la sécurisation. Le prochain chantier commence là. ☕ #infosec #ShadowAI #AppSec
    venturebeat.com/security/vibe-

  2. DATE: May 7, 2026 at 05:13PM
    SOURCE: HEALTHCARE INFO SECURITY

    Direct article link at end of text block below.

    The #Privacy Risks of Embedded, #ShadowAI in #Healthcare t.co/hZE1uWwdTW #AI

    Here are any URLs found in the article text:

    t.co/hZE1uWwdTW

    Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

    -------------------------------------------------

    Private, vetted email list for mental health professionals: clinicians-exchange.org

    Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

    -------------------------------------------------

    #security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

  3. DATE: May 7, 2026 at 05:13PM
    SOURCE: HEALTHCARE INFO SECURITY

    Direct article link at end of text block below.

    The #Privacy Risks of Embedded, #ShadowAI in #Healthcare t.co/hZE1uWwdTW #AI

    Here are any URLs found in the article text:

    t.co/hZE1uWwdTW

    Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

    -------------------------------------------------

    Private, vetted email list for mental health professionals: clinicians-exchange.org

    Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

    -------------------------------------------------

    #security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

  4. DATE: May 7, 2026 at 05:13PM
    SOURCE: HEALTHCARE INFO SECURITY

    Direct article link at end of text block below.

    The #Privacy Risks of Embedded, #ShadowAI in #Healthcare t.co/hZE1uWwdTW #AI

    Here are any URLs found in the article text:

    t.co/hZE1uWwdTW

    Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

    -------------------------------------------------

    Private, vetted email list for mental health professionals: clinicians-exchange.org

    Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

    -------------------------------------------------

    #security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

  5. DATE: May 7, 2026 at 05:13PM
    SOURCE: HEALTHCARE INFO SECURITY

    Direct article link at end of text block below.

    The #Privacy Risks of Embedded, #ShadowAI in #Healthcare t.co/hZE1uWwdTW #AI

    Here are any URLs found in the article text:

    t.co/hZE1uWwdTW

    Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

    -------------------------------------------------

    Private, vetted email list for mental health professionals: clinicians-exchange.org

    Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

    -------------------------------------------------

    #security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

  6. AI-BOMs Emerge to Secure Enterprise AI Supply Chains

    Imagine biting into a mysterious birthday cake without knowing its ingredients or who baked it - that's what it's like for enterprises trying to secure their AI supply chains without visibility into the components used to build their AI systems. Traditional software bills of materials just aren't cutting it in this new landscape.

    osintsights.com/ai-boms-emerge

    #AiSupplyChains #ArtificialIntelligence #ShadowAi #Sbom #EnterpriseSecurity

  7. 78% of your employees are bringing their own AI to work.

    A sales hire pastes a confidential transcript into ChatGPT to save time. Your IP is now training a public model.

    60% admit they'll bypass an #AI ban to hit productivity targets. Banning doesn't stop #ShadowAI, it just moves it to personal devices where you have zero control.

    This is an access problem, not a compliance problem.

    amazee.ai/blog/solving-the-sha

  8. 78% of your employees are bringing their own AI to work.

    A sales hire pastes a confidential transcript into ChatGPT to save time. Your IP is now training a public model.

    60% admit they'll bypass an #AI ban to hit productivity targets. Banning doesn't stop #ShadowAI, it just moves it to personal devices where you have zero control.

    This is an access problem, not a compliance problem.

    amazee.ai/blog/solving-the-sha

  9. 78% of your employees are bringing their own AI to work.

    A sales hire pastes a confidential transcript into ChatGPT to save time. Your IP is now training a public model.

    60% admit they'll bypass an #AI ban to hit productivity targets. Banning doesn't stop #ShadowAI, it just moves it to personal devices where you have zero control.

    This is an access problem, not a compliance problem.

    amazee.ai/blog/solving-the-sha

  10. 78% of your employees are bringing their own AI to work.

    A sales hire pastes a confidential transcript into ChatGPT to save time. Your IP is now training a public model.

    60% admit they'll bypass an #AI ban to hit productivity targets. Banning doesn't stop #ShadowAI, it just moves it to personal devices where you have zero control.

    This is an access problem, not a compliance problem.

    amazee.ai/blog/solving-the-sha

  11. 78% of your employees are bringing their own AI to work.

    A sales hire pastes a confidential transcript into ChatGPT to save time. Your IP is now training a public model.

    60% admit they'll bypass an #AI ban to hit productivity targets. Banning doesn't stop #ShadowAI, it just moves it to personal devices where you have zero control.

    This is an access problem, not a compliance problem.

    amazee.ai/blog/solving-the-sha

  12. You can’t protect what you can’t see. 🔍 AI adoption is growing, but your security doesn't have to suffer. Cloudflare’s Max Imbiel shares how to gain visibility using your existing SASE & DNS data.
    Read more via Dark Reading: darkreading.com/cyberattacks-d #ShadowAI #CloudflareOne

  13. You can’t protect what you can’t see. 🔍 AI adoption is growing, but your security doesn't have to suffer. Cloudflare’s Max Imbiel shares how to gain visibility using your existing SASE & DNS data.
    Read more via Dark Reading: darkreading.com/cyberattacks-d #ShadowAI #CloudflareOne

  14. You can’t protect what you can’t see. 🔍 AI adoption is growing, but your security doesn't have to suffer. Cloudflare’s Max Imbiel shares how to gain visibility using your existing SASE & DNS data.
    Read more via Dark Reading: darkreading.com/cyberattacks-d #ShadowAI #CloudflareOne

  15. You can’t protect what you can’t see. 🔍 AI adoption is growing, but your security doesn't have to suffer. Cloudflare’s Max Imbiel shares how to gain visibility using your existing SASE & DNS data.
    Read more via Dark Reading: darkreading.com/cyberattacks-d #ShadowAI #CloudflareOne

  16. You can’t protect what you can’t see. 🔍 AI adoption is growing, but your security doesn't have to suffer. Cloudflare’s Max Imbiel shares how to gain visibility using your existing SASE & DNS data.
    Read more via Dark Reading: darkreading.com/cyberattacks-d #ShadowAI #CloudflareOne

  17. 🎙️ Nouvel épisode avec Cyndie Fletz, Nicolas Milot et Dominique Derrier : on parle Shadow AI et PME.

    Interdire l'IA en entreprise ? Ça ne fonctionne pas. Mieux vaut éduquer, encadrer et fournir les bons outils.

    Comme avec des ados : on peut pas tout contrôler, mais on peut inculquer les bons réflexes. 😅

    🎧 Web: polysecure.ca/posts/episode-0x
    🎧 Spotify: open.spotify.com/episode/5KI2S
    🎧 YouTube: youtu.be/kXXK8rh3F1E

    #ShadowAI #Cybersécurité #PME #Podcast

  18. 🎙️ Nouvel épisode avec Cyndie Fletz, Nicolas Milot et Dominique Derrier : on parle Shadow AI et PME.

    Interdire l'IA en entreprise ? Ça ne fonctionne pas. Mieux vaut éduquer, encadrer et fournir les bons outils.

    Comme avec des ados : on peut pas tout contrôler, mais on peut inculquer les bons réflexes. 😅

    🎧 Web: polysecure.ca/posts/episode-0x
    🎧 Spotify: open.spotify.com/episode/5KI2S
    🎧 YouTube: youtu.be/kXXK8rh3F1E

    #ShadowAI #Cybersécurité #PME #Podcast

  19. Browser Extensions Emerge as Unchecked AI Security Risk

    Did you know that the biggest AI security risk to your organization might be hiding in plain sight - in the browser extensions used by every employee, quietly evading your existing security protections? A recent report from LayerX reveals the shocking truth about this largely overlooked threat.

    osintsights.com/browser-extens

    #AiSecurityRisk #BrowserExtensions #EmergingThreats #Genai #ShadowAi

  20. Shadow AI Emerges as Unseen Threat in Enterprise Security

    As AI assistants and automation services increasingly seep into everyday use, employers are faced with a daunting question: are productivity gains worth the risk of losing control? Employees are quietly adopting unsanctioned AI tools, often blurring the lines between efficiency and security.

    osintsights.com/shadow-ai-emer

    #ShadowAi #EnterpriseSecurity #EmergingThreats #UnapprovedSoftware #ProductivityTools

  21. #Hollywood #assistants are increasingly using #AI tools, both officially sanctioned and #shadowAI, to manage larger workloads and shrinking headcounts. While AI is being used for tasks like composing emails and generating script coverage, concerns exist about its limitations in capturing the nuances of storytelling and its potential impact on job security. hollywoodreporter.com/movies/m #tech #media #news

  22. #Hollywood #assistants are increasingly using #AI tools, both officially sanctioned and #shadowAI, to manage larger workloads and shrinking headcounts. While AI is being used for tasks like composing emails and generating script coverage, concerns exist about its limitations in capturing the nuances of storytelling and its potential impact on job security. hollywoodreporter.com/movies/m #tech #media #news

  23. #Hollywood #assistants are increasingly using #AI tools, both officially sanctioned and #shadowAI, to manage larger workloads and shrinking headcounts. While AI is being used for tasks like composing emails and generating script coverage, concerns exist about its limitations in capturing the nuances of storytelling and its potential impact on job security. hollywoodreporter.com/movies/m #tech #media #news

  24. #Hollywood #assistants are increasingly using #AI tools, both officially sanctioned and #shadowAI, to manage larger workloads and shrinking headcounts. While AI is being used for tasks like composing emails and generating script coverage, concerns exist about its limitations in capturing the nuances of storytelling and its potential impact on job security. hollywoodreporter.com/movies/m #tech #media #news

  25. #Hollywood #assistants are increasingly using #AI tools, both officially sanctioned and #shadowAI, to manage larger workloads and shrinking headcounts. While AI is being used for tasks like composing emails and generating script coverage, concerns exist about its limitations in capturing the nuances of storytelling and its potential impact on job security. hollywoodreporter.com/movies/m #tech #media #news

  26. El Caballo de Troya en tu Navegador: Los Riesgos de la IA Generativa en la Empresa

    Por: Ariel Corgatelli

    El dilema de la productividad: ¿A qué costo estamos ahorrando tiempo? La fuga de datos a través de chatbots se ha convertido en el nuevo dolor de cabeza para los departamentos de ciberseguridad.

    El avance de la Inteligencia Artificial generativa ha sido meteórico. Herramientas como ChatGPT, Claude o Gemini se han vuelto compañeros inseparables de miles de empleados que buscan optimizar tareas tediosas. Sin embargo, en esta carrera por la eficiencia, se está abriendo una brecha de seguridad silenciosa pero letal: la exposición de datos corporativos sensibles.

    https://www.instagram.com/reel/DWwfk4GoASs/

    1. El algoritmo nunca olvida

    El concepto fundamental que muchos usuarios ignoran es que los chatbots no son herramientas de procesamiento estático, sino modelos en constante aprendizaje. La mayoría de las versiones gratuitas de estas plataformas utilizan los «prompts» (las instrucciones o textos que ingresamos) para re-entrenar sus algoritmos.

    Cuando un empleado sube un código fuente para buscar un error, o un acta de directorio para que la IA redacte un resumen, esa información deja de pertenecer a la empresa. Pasa a formar parte del vasto conjunto de datos del modelo y, en teoría, podría aparecer filtrada o influenciar respuestas generadas para otros usuarios en el futuro.

    2. El peligro del «Shadow AI»

    Así como hace años hablábamos del Shadow IT (el uso de software no autorizado por el departamento de sistemas), hoy nos enfrentamos al Shadow AI.

    El riesgo es doble:

    • Pérdida de Propiedad Intelectual: Algoritmos, estrategias de marketing antes de ser lanzadas o procesos industriales únicos.
    • Cumplimiento Legal (Compliance): Subir datos de clientes o empleados a servidores de terceros puede violar leyes de protección de datos personales (como la GDPR o normativas locales), exponiendo a la empresa a multas millonarias.

    3. El factor humano y el «atajo» peligroso

    El eslabón más débil sigue siendo el usuario. Muchos empleados, bajo la presión de la inmediatez, trabajan documentos importantes con IA sin saber los daños que pueden generar. No hay mala intención, hay falta de formación en cultura de ciberseguridad. Una planilla de Excel con sueldos o una base de datos de clientes subida a una IA «para que la ordene» es, técnicamente, una filtración de datos autoinfligida.

    Guía de Buenas Prácticas: ¿Cómo usar la IA sin comprometer a la empresa?

    Para aprovechar los beneficios de la IA sin convertirla en un riesgo, es fundamental seguir estos pilares:

    • Anonimización: Antes de interactuar con una IA, se deben eliminar nombres reales, direcciones IP, correos electrónicos y cifras financieras exactas. Usar «Empresa X» o «Monto Y» protege el contexto sin sacrificar el resultado.
    • Uso de Versiones Enterprise: Las empresas deben invertir en licencias corporativas que garantizan que los datos no se utilicen para entrenar modelos públicos y que cumplen con estándares de privacidad específicos.
    • Políticas de Uso Claro: No se trata de prohibir, sino de regular. Crear una guía interna que especifique qué tipo de información puede tocar la IA y cuál debe permanecer estrictamente en servidores locales.
    • Revisión de Configuraciones: Verificar siempre en los ajustes de la herramienta si existe la opción de «Desactivar historial y entrenamiento».

    Conclusión

    La Inteligencia Artificial es una herramienta de transformación increíble, pero en ciberseguridad, la confianza ciega no es una opción. Como siempre decimos, la seguridad de la información comienza con la conciencia del usuario.

    #arielmcorg #chatgpt #ciberseguridad #IA #infosertec #PORTADA #RADIOGEEK #SeguridadInformatica #ShadowAI #tecnologia