{"id":1975,"date":"2024-09-10T12:22:26","date_gmt":"2024-09-10T12:22:26","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/09\/10\/shining-a-light-on-shadow-apps-the-invisible-gateway-to-saas-data-breaches\/"},"modified":"2024-09-10T12:22:26","modified_gmt":"2024-09-10T12:22:26","slug":"shining-a-light-on-shadow-apps-the-invisible-gateway-to-saas-data-breaches","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/09\/10\/shining-a-light-on-shadow-apps-the-invisible-gateway-to-saas-data-breaches\/","title":{"rendered":"Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches"},"content":{"rendered":"<p>\u200bShadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.\u00a0<br \/>\nShadow apps may include instances of software that the company is already using. For example, a dev team may onboard their own\u00a0Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.\u00a0<br \/>\nShadow apps may include instances of software that the company is already using. For example, a dev team may onboard their own\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bShadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.\u00a0 Shadow apps may include instances of software that the company is already using. For&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/09\/10\/shining-a-light-on-shadow-apps-the-invisible-gateway-to-saas-data-breaches\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":1976,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1975"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=1975"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1975\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/1976"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=1975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=1975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=1975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}