{"id":1387,"date":"2025-08-20T17:25:00","date_gmt":"2025-08-20T17:25:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=1387"},"modified":"2025-08-20T17:25:00","modified_gmt":"2025-08-20T17:25:00","slug":"%f0%9f%95%b5%ef%b8%8f-webinar-discover-and-control-shadow-ai-agents-in-your-enterprise-before-hackers-do","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=1387","title":{"rendered":"\ud83d\udd75\ufe0f Webinar: Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do"},"content":{"rendered":"<p>Do you know how many AI agents are running inside your business right now?<br \/>\nIf the answer is \u201cnot sure,\u201d you\u2019re not alone\u2014and that\u2019s exactly the concern.<br \/>\nAcross industries, AI agents are being set up every day. Sometimes by IT, but often by business units moving fast to get results. That means agents are running quietly in the background\u2014without proper IDs, without owners, and without logs of<\/p>","protected":false},"excerpt":{"rendered":"<p>Do you know how many AI agents are running inside your business right now? If the answer is \u201cnot sure,\u201d you\u2019re not alone\u2014and that\u2019s exactly the concern. Across industries, AI&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1388,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-1387","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1387"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1387\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/1388"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}