LMG Security<p>Are Shadow Channels Like Signal Putting Your Organization at Risk?</p><p>Unauthorized communication platforms—aka shadow channels—are creating compliance and security nightmares for enterprise and government environments. Recent controversies involving tools like Signal and Gmail in sensitive governmental contexts underscore the extent of these risks.</p><p>In this week’s Cyberside Chats, special guest <span class="h-card" translate="no"><a href="https://infosec.exchange/@grl_geek" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grl_geek</span></a></span> joins <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MDurrin</span></a></span> to break down:</p><p>▪ What platforms like Signal offer—and their limitations in enterprise settings.<br>▪ Why users bypass official channels, leading to compliance failures.<br>▪ Real-world implications from recent incidents, including U.S. officials using unsecured communication tools.<br>▪ The broader shadow IT landscape and why it’s a pressing issue for security leaders.</p><p>🎥 Watch the full video: <a href="https://youtu.be/XKvY5uxJwJY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/XKvY5uxJwJY</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/unmasking-shadow-it-navigating-unauthorized-communication-tools/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/unmasking-</span><span class="invisible">shadow-it-navigating-unauthorized-communication-tools/</span></a></p><p><a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/ShadowChannels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShadowChannels</span></a> <a href="https://infosec.exchange/tags/UnauthorizedPlatforms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnauthorizedPlatforms</span></a> <a href="https://infosec.exchange/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> <a href="https://infosec.exchange/tags/Compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Compliance</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ShadowIT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShadowIT</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a></p>