{"id":475,"date":"2025-06-09T11:00:00","date_gmt":"2025-06-09T11:00:00","guid":{"rendered":"http:\/\/infosec-daily.com\/?page_id=475"},"modified":"2025-06-09T11:00:00","modified_gmt":"2025-06-09T11:00:00","slug":"think-your-idp-or-casb-covers-shadow-it-these-5-risks-prove-otherwise","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=475","title":{"rendered":"Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise"},"content":{"rendered":"<p>You don\u2019t need a rogue employee to suffer a breach.<br \/>\nAll it takes is a free trial that someone forgot to cancel. An AI-powered note-taker quietly syncing with your Google Drive. A personal Gmail account tied to a business-critical tool. That\u2019s shadow IT. And today, it\u2019s not just about unsanctioned apps, but also dormant accounts, unmanaged identities, over-permissioned SaaS<\/p>","protected":false},"excerpt":{"rendered":"<p>You don\u2019t need a rogue employee to suffer a breach. All it takes is a free trial that someone forgot to cancel. An AI-powered note-taker quietly syncing with your Google&hellip;<\/p>\n","protected":false},"author":1,"featured_media":476,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-475","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=475"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/476"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}