DeFi Daily News
Monday, March 9, 2026
Advertisement
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos
No Result
View All Result
DeFi Daily News
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos
No Result
View All Result
DeFi Daily News
No Result
View All Result
Home DeFi Metaverse

rewrite this title The Security Peril in the Pipes: Why Collaboration Interoperability is the New Shadow IT – UC Today

Kieran Devlin by Kieran Devlin
March 5, 2026
in Metaverse
0 0
0
rewrite this title The Security Peril in the Pipes: Why Collaboration Interoperability is the New Shadow IT – UC Today
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on Telegram
Listen to this article


rewrite this content using a minimum of 1000 words and keep HTML tags

For many modern enterprises, it is often a tale of two cities. In one department, Microsoft Teams might be the de facto operating system for work; in another, many in engineering and DevOps teams cling fiercely to Slack. For years, CIOs accepted this bifurcation in collaboration as a necessary friction. However, the recent surge in interoperability tools, middleware bridges like Mio and Matrix, and proprietary connectors promised a truce. These tools drill tunnels through the walls, allowing a message typed in Teams to appear instantaneously in a Slack channel. Yet beneath the seamless workflow lies a security and governance minefield.

“When a Teams user interacts with a Slack user, the real risk isn’t the humans – it’s the non-human identity brokering the exchange,” warned Puneet Bhatnagar to UC Today.

Bhatnagar, formerly Senior Vice President and Head of Identity Management at Blackstone and CISO at Dave & Buster’s, highlights a critical blind spot in the rush toward “open” collaboration. By focusing on the endpoints, security leaders have neglected the “pipes.”

Recent data from Josys reveals that 85 percent of SaaS identities have more permissions than necessary. This finding aligns with the Cloud Security Alliance’s 2025 report, which identified “over-privileged access” as a top-tier risk. When we connect two secure fortresses with an unguarded tunnel, we have bypassed our security rather than enhanced it.

The Collaboration Identity Crisis: The “God-Mode” Problem for Security

A foundational principle of modern cybersecurity is “least privilege,” the idea that a user or bot should only have access to what they strictly need. Interoperability bridges, by their very nature, struggle to respect this. To function, a bridge often requires broad read/write permissions to sync messages across platforms. It effectively needs to see everything to move anything.

“Most interoperability relies on OAuth tokens, service principals, or middleware connectors with broad API scopes,” Bhatnagar explained. “If that intermediary identity holds cross-platform read/write permissions, it becomes a transitive privilege amplifier – effectively bypassing native least-privilege controls in each system.”

This creates a terrifying scenario for the CISO, conjuring the image of a “God-mode” superuser that exists outside the standard hierarchy. If a threat actor compromises a user in Teams, their lateral movement is usually limited by that user’s specific Azure AD permissions. But if they compromise the bridge itself, or the token it uses, they potentially gain the keys to both kingdoms.

The risk is compounded when third parties enter the mix. In a complex supply chain, your organization might be bridging its internal Teams environment with a partner’s Slack workspace. “The risk intensifies with third-party identities (contractors, partners) governed outside your primary IAM boundary,” said Bhatnagar.

“Once access traverses ecosystems, enforcement consistency depends on how attributes and roles are translated between identity providers.”

To mitigate this, organizations must treat these bridges not as passive utilities but as active, privileged entities. Bhatnagar advised that “least privilege must extend to orchestration identities – not just end users.” This requires a shift in mindset of continuous monitoring of token issuance, tracking of privilege drift, and validation of attribute mapping across domains.

The Collaboration Security Black Hole: Data in Motion

If identity is the lock, data residency is the border control. For multinational corporations subject to GDPR or CCPA, the physical location of data is a matter of legal liability.

Data residency laws are generally binary. Data stays in the EU, or it doesn’t. However, in a mesh of interoperable apps, messages are constantly in motion. A regulated artifact leaving a compliant Teams environment and entering a partner’s Webex instance via a middleware bridge enters a legal grey zone.

“Data residency assumes stable custody boundaries. Interoperability disrupts that assumption,” noted Bhatnagar.

“When regulated data moves between tenants via middleware, three identity contexts are involved: the originating user, the integration identity, and the receiving tenant. Governance breaks when identity context is transformed or stripped during that transition.”

The technical challenge is that metadata, the “tags” that say Confidential or EU Eyes Only, often gets washed away in the pipe. Middleware frequently re-tokenizes or normalizes identity claims to make the message readable on the other side. “If classification metadata or policy bindings don’t persist across APIs, enforcement becomes probabilistic,” Bhatnagar emphasized.

This aligns with broader industry concerns. The 2025 Global State of API Security report found that 57 percent of organizations reported a data breach caused by API exploitation in the last two years. The “pipe” is often the source of the leak. Without what Bhatnagar called “integration-layer governance,” organizations are flying blind. “Compliance visibility degrades the moment data crosses ecosystems,” he concluded. The only defense is persistent data classification tagging and auditable identity assertions that survive the jump between platforms.

The Fog of War: Shattering the Collaboration Single Pane of Glass

For the last decade, security vendors have promised the “Single Pane of Glass,” a unified dashboard where a security analyst can see every threat. Cross-platform collaboration shatters this glass.

Imagine an insider threat investigation involving a conversation that spanned three different ecosystems: a file shared in Teams, discussed in Slack, and leaked via a Zoom chat. Reconstructing this narrative is a forensic nightmare.

“In theory, yes (it is possible for an interoperable single pane of glass). In practice, it’s complex,” Bhatnagar stressed. “Each platform logs differently, and identity formats rarely align. The same individual may appear as a UPN in Azure AD, an email alias in Slack, or a federated SAML assertion in a partner tenant.”

This fragmentation forces security teams to engage in what Bhatnagar described as “manual stitching of timestamps rather than reconstruction of intent.” When logs are siloed in three different proprietary formats, correlating an attack timeline in real time becomes nearly impossible.

The solution requires rigorous logging standardization at the transit layer. Practical forensics demands canonical identity mapping and normalized event schemas. “Until identity context survives transit intact, the ‘single pane of glass’ remains aspirational,” Bhatnagar stated.

Security in the Seams

The push for interoperability is irreversible. The friction of walled gardens is too high a price for modern, agile businesses to pay. However, treating these bridges as “set and forget” utilities is a colossal strategic error.

The security perimeter is well beyond embodying a circle drawn around the company. At this stage, it is the sum of the seams between applications. As Bhatnagar succinctly puts it, “Interoperability isn’t inherently risky – unmanaged trust is.”

If these connectors are not continuously evaluated and included in access reviews, they become “invisible control-plane actors,” or as Bhatnagar described them:

“Sanctioned shadow IT: officially approved, but insufficiently scrutinized.”

The future of secure collaboration hinges on recognizing that the pipes are just as important as the platforms. We must inspect the toll booths, audit the bridges, and ensure that when our data travels, our governance travels with it.

and include conclusion section that’s entertaining to read. do not include the title. Add a hyperlink to this website http://defi-daily.com and label it “DeFi Daily News” for more trending news articles like this



Source link

Tags: CollaborationInteroperabilityperilPipesrewritesecurityshadowtitleToday
ShareTweetShare
Previous Post

rewrite this title Price vs. Plumbing: Why Ethereum’s February Crash Collided With A Record Surge In Cold-Storage Migration | Bitcoinist.com

Next Post

rewrite this title with good SEO Bitcoin Historically Bottoms Between These MVRV Levels—Where Are They Now?

Next Post
rewrite this title with good SEO Bitcoin Historically Bottoms Between These MVRV Levels—Where Are They Now?

rewrite this title with good SEO Bitcoin Historically Bottoms Between These MVRV Levels—Where Are They Now?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

No Result
View All Result
  • Trending
  • Comments
  • Latest
rewrite this title Critics Mock Anthropic’s Claims Chinese AI Labs Are Stealing Its Data – Decrypt

rewrite this title Critics Mock Anthropic’s Claims Chinese AI Labs Are Stealing Its Data – Decrypt

February 23, 2026
rewrite this title and make it good for SEO Kite (KITE) Will Be Listed on Binance HODLer Airdrops!

rewrite this title and make it good for SEO Kite (KITE) Will Be Listed on Binance HODLer Airdrops!

November 1, 2025
rewrite this title Klarna CEO wants to turn the platform into a ‘super app’ with help from AI

rewrite this title Klarna CEO wants to turn the platform into a ‘super app’ with help from AI

June 18, 2025
Waitlist Now Open for Virgin Red Credit Card Issued by Synchrony – NerdWallet

Waitlist Now Open for Virgin Red Credit Card Issued by Synchrony – NerdWallet

August 14, 2024
rewrite this title with good SEO Solana Price Holds 0–0 as Breakout Looms

rewrite this title with good SEO Solana Price Holds $120–$130 as Breakout Looms

December 14, 2025
rewrite this title and make it good for SEODelhi woman’s ‘Hire My Dad’ LinkedIn post wins hearts, goes viral

rewrite this title and make it good for SEODelhi woman’s ‘Hire My Dad’ LinkedIn post wins hearts, goes viral

January 11, 2025
rewrite this title North Korean test now lies ahead for Matildas as China go some way in answering their doubters

rewrite this title North Korean test now lies ahead for Matildas as China go some way in answering their doubters

March 9, 2026
rewrite this title Bitcoin traders focus on k as oil surges past 5 and weak jobs data rattle markets

rewrite this title Bitcoin traders focus on $61k as oil surges past $115 and weak jobs data rattle markets

March 9, 2026
rewrite this title Big UC Update: CallTower – UC Today

rewrite this title Big UC Update: CallTower – UC Today

March 9, 2026
rewrite this title Are Bitcoin And Tech Stocks Really Linked? NYDIG Says Not So Fast

rewrite this title Are Bitcoin And Tech Stocks Really Linked? NYDIG Says Not So Fast

March 9, 2026
rewrite this title Post-Quantum Shift Could Force Crypto Exchanges to Rethink Wallet Security – Decrypt

rewrite this title Post-Quantum Shift Could Force Crypto Exchanges to Rethink Wallet Security – Decrypt

March 9, 2026
rewrite this title Aave Users Reach Record as Traders Quietly Shift Capital Toward DeFi Lending – Decrypt

rewrite this title Aave Users Reach Record as Traders Quietly Shift Capital Toward DeFi Lending – Decrypt

March 9, 2026
DeFi Daily

Stay updated with DeFi Daily, your trusted source for the latest news, insights, and analysis in finance and cryptocurrency. Explore breaking news, expert analysis, market data, and educational resources to navigate the world of decentralized finance.

  • About Us
  • Blogs
  • DeFi-IRA | Learn More.
  • Advertise with Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2024 Defi Daily.
Defi Daily is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos

Copyright © 2024 Defi Daily.
Defi Daily is not responsible for the content of external sites.