#unauthorized applications Cursor Rules
Cursor IDE rules tagged with #unauthorized applications.
Addressing Security Risks in Shadow IT and Unauthorized Applications
Identifying and mitigating threats posed by unsanctioned applications and systems within an organization.