Antares
All insights
Cybersecurity StrategyApril 18, 2025·5 min read

The Threat You Haven't Mapped: Shadow IT, IoT, and the Expanding Attack Surface

You cannot protect what you cannot see. Shadow IT, connected devices, and cloud services adopted without security review collectively represent a significant and often unmapped exposure.

You can't protect what you can't see. It's one of the foundational principles of cybersecurity risk management — and one of the most consistently underestimated challenges facing mid-market organizations.

The attack surface of a modern organization extends well beyond the systems IT manages. Shadow IT, connected devices, and cloud services adopted without security review collectively represent a significant and often unmapped exposure. Adversaries don't limit themselves to your known environment. Neither should your risk assessment.

Shadow IT: The Visibility Gap

Shadow IT refers to technology — applications, cloud services, devices — that employees adopt and use without IT or security oversight. It's not always malicious or even careless. Employees adopt tools that make them more productive. The problem is that these tools often process or store sensitive data outside the organization's security controls.

Common examples: employees using personal cloud storage for work files; business units adopting SaaS applications without security review; AI tools being used to process internal data without IT awareness. Each represents data flowing outside the boundary of the organization's security program.

The first step in addressing shadow IT is visibility. Regular discovery scans, network monitoring, and a culture where employees report the tools they're using — rather than hiding them for fear of losing access — are all components of a functional approach.

IoT and Connected Devices

The proliferation of connected devices has expanded the attack surface dramatically. Every device connected to an organizational network represents a potential entry point. Unlike traditional endpoints, IoT devices often run embedded firmware that's difficult to update, isn't covered by standard endpoint security tools, and may have been designed with functionality rather than security as the primary objective.

Inventory is again the starting point: what devices are connected to your network, what firmware versions are they running, and what network access do they have? Network segmentation — isolating IoT devices from systems that process sensitive data — is a foundational control that limits the blast radius of a compromised device.

Cloud Services and Unmanaged Access

Cloud adoption has accelerated significantly, and most organizations now operate in hybrid or multi-cloud environments. The challenge for security programs is that cloud services are often adopted faster than security controls can be applied.

Key risk areas: misconfigured storage buckets exposing sensitive data; overly permissive identity and access management; lack of visibility into what data has been moved to cloud environments; and API integrations between cloud services that aren't captured in the vendor risk program.

The Governance Response

Addressing the expanding attack surface requires more than technical controls. It requires governance: policies that define how technology is adopted, processes for bringing new systems into the security program, and regular discovery to identify what's already operating outside those controls.

Organizations that treat asset inventory as a one-time exercise consistently underestimate their attack surface. Maintaining an accurate, current view of your environment — including shadow IT, connected devices, and cloud services — is an ongoing operational requirement, not a project.

About the author
Branden Rowe, Founder and Managing Director of Antares Security

Branden Rowe

Founder & Managing Director, Antares Security

Branden Rowe is the Founder and Managing Director of Antares Security, a cybersecurity advisory practice focused on governance, operational security, risk management, and executive-level security leadership. His career spans security and risk leadership across regulated and enterprise environments including Northern Trust, Baker Tilly, Wolters Kluwer, and Cushman & Wakefield.

Need a senior advisory perspective on your security program?

A 30–45 minute advisory call covers operating context, current posture, and the decisions forcing the work. If a fit exists, we propose scope.