#unauthorized applications Cursor Rules

Cursor IDE rules tagged with #unauthorized applications.

Addressing Security Risks in Shadow IT and Unauthorized Applications

Identifying and mitigating threats posed by unsanctioned applications and systems within an organization.