• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
block the prompt, not the work: the end of "doctor

Block the Prompt, Not the Work: The End of “Doctor No”

You are here: Home / General Cyber Security News / Block the Prompt, Not the Work: The End of “Doctor No”
April 1, 2026

There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build. It doesn’t enable. Its entire function is to say “No.”

No to ChatGPT.

No to DeepSeek.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


No to the file-sharing tool the product team swears by.

For years, this looked like security. But in 2026, “Doctor No” is no longer just a management headache – it is a systemic security liability. Because when you block the work, users don’t stop. They reroute.

The Tax-Evaders of Productivity

When security feels like a tax on efficiency, employees find a way to “evade” it.

The industry has long relied on Endpoint Agents to enforce control. But as any CISO knows, these agents come with a heavy “tax.” They hook into the OS kernel, they’re invasive, they notoriously break during macOS updates, and they make high-performance machines run hot.

The result? Users find workarounds. Files move into personal Gmail. Prompts are pasted into unmanaged AI tools. This is the Workaround Economy – a shadow infrastructure that exists not despite your security, but because of it. And the defining characteristic of this economy is that it operates with zero organizational visibility.

The Illusion of Control: The “Theatrical” Stack

Most teams still default to blocking because their legacy tools were never built to do much else. It’s not that these capabilities don’t exist; it’s that they are architecturally untenable for modern web work.

  • The SSL Inspection Trap: Firewalls, Secure Web Gateways (SWG), and even many modern SASE/SSE solutions technically attempt to “see” encrypted traffic through SSL decryption. But in a world of certificate pinning and complex web app “plumbing,” this brute-force approach is a high-risk trade-off. Because these tools sit between the user and the web, they frequently break the very tools – like Slack, WhatsApp, or high-performance GenAI interfaces – that the business relies on. For a CISO, the choice is binary and brutal: turn on inspection and break the user experience, or turn it off and remain blind.
  • The Visibility Gap: EDR sees machine-level processes, and legacy DLP scans files at rest. But for most organizations, the live, streaming browser session remains a black box. While some newer ‘suite’ extensions attempt to peek inside, they only work on managed devices where the IT team has total control. Even then, they often come with a hidden cost: micro-latencies that make typing feel ‘laggy,’ rendering errors that break complex web app interfaces, and heavy CPU usage that turns a high-end laptop into a space heater. And even still, they remain blind to the prompt typed on a contractor’s laptop, a partner’s browser, or an unmanaged home device—the exact places where sensitive data is most likely to leak before the user even clicks ‘send’.
  • The Extension Jungle: You can block a URL, but can you see the browser extension silently harvesting credentials? Most stacks cannot.

Blocking a website while leaving the browser session unmonitored is Theatrical Security. It provides the appearance of a policy without the reality of protection.

The Law Firm Lesson: A Case of “Ghost” Compliance

A prominent U.S. law firm recently discovered the danger of this gap. When data sovereignty concerns arose around DeepSeek, they did what seemed right: they blocked the domain. IT closed the ticket. Leadership felt covered.

A subsequent visibility exercise told a different story.

Seventy percent of their users had already installed an AI “wrapper” extension. Because the extension executed entirely inside the browser session, it was invisible to the firewall and the endpoint agent. Corporate traffic was being silently routed through servers in China. No alert had fired. No policy had triggered.

They had blocked the website. They hadn’t blocked the risk.

While satisfied to find this gap, that feeling was quickly overshadowed by the particular stress of discovering that a control you’d trusted was purely theatrical. The compliance implications could have been dire.

The New Standard: Secure the Session, Not the Device

The browser has become the new OS of work. Security that lives anywhere else is simply too far away from the “Point of Risk.”

The standard in 2026 is moving away from invasive agents and toward Session-Level Governance. The goal is a toolset that provides surgical control – governing the data, not the destination.

This requires a standard of security that can:

  • Execute Prompt-Level DLP: Identifying and redacting sensitive code or PII in real-time, within the buffer, before the “Send” button is ever clicked.
  • Govern the Extension Layer: Identifying and risk-scoring the “silent” extensions that bypass domain blocks entirely.
  • Enforce Agentless Controls: Providing clipboard and upload governance that works on any browser, on any device (including BYOD and contractors), without the “kernel-hooking” performance tax that drives users toward workarounds.

From Gatekeeper to Enabler

The role of security teams is changing. Instead of defining themselves as “gatekeepers”, most successful security leaders are now becoming a visibility layer – one that enables the business to say “Yes” because they can finally see, and govern, what happens when people work.

The question is no longer whether your users are using AI. They are. The question is whether your security stack is helping them do it safely, or simply forcing them into the shadows.

Keep the good work. Block the bad. That is the standard now for the modern digital workplace.

To learn more about how to govern GenAI use – with prompt-level visibility and real-time DLP – without blocking the productivity your teams depend on, visit: redaccess.io/use-case-genai/

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «casbaneiro phishing targets latin america and europe using dynamic pdf Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Block the Prompt, Not the Work: The End of “Doctor No”
  • Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
  • Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
  • New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
  • 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
  • Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
  • Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms
  • Android Developer Verification Rollout Begins Ahead of September Enforcement
  • TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
  • Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

Copyright © TheCyberSecurity.News, All Rights Reserved.