• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
data leakage prevention in the age of cloud computing: a

Data Leakage Prevention in the Age of Cloud Computing: A New Approach

You are here: Home / General Cyber Security News / Data Leakage Prevention in the Age of Cloud Computing: A New Approach
March 11, 2024

As the change of IT infrastructure to cloud-centered alternatives celebrates its 10-12 months anniversary, it gets clear that regular on-premises ways to facts security are getting obsolete. Relatively than guarding the endpoint, DLP remedies need to have to refocus their efforts to where by company facts resides – in the browser.

A new guide by LayerX titled “On-Prem is Useless. Have You Modified Your Web DLP Plan?” (download in this article) dives into this transition, detailing its root cause, feasible alternative paths forward and actionable implementation illustrations. After looking at the information, security and IT industry experts will be geared up with the relevant facts they require to update and up grade their DLP methods.

Information highlights consist of:

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Why DLP

The guideline commences with an clarification of the position of the DLP. DLPs defend facts from undesirable exposure by classification, pinpointing its sensitivity amount, and implementing protecting action. This is meant to enable businesses to detect and avoid knowledge breaches and other malicious activities and meet up with compliance polices.

What Has Altered for DLP and Corporate Info

However, DLPs ended up developed with on-prem environments in head. In these scenarios, details that leaves the ecosystem is usually hooked up to an email or a components gadget. For that reason, DLPs have been ordinarily put on the gateway concerning the corporate network and the community Internet. The rise of SaaS apps and web site use requires an approach that addresses company facts in its new area: on line.

3 Details Defense Paths Ahead

To address this gap, there are a few approaches security and IT groups can function.

1. No Improve – Applying DLPs options as they are when limiting info uploads to insecure online areas. As described, this alternative is partly productive.

2. CASB DLP – Inspecting files with SaaS applications and imposing insurance policies between apps and products and applications. This answer is productive for some sanctioned apps, but not for all or for unsanctioned ones.

3. Browser DLP – Checking info action at the transaction issue. This alternative enforces procedures throughout all vectors – equipment, apps and the browser.

Considering the fact that the browser is the interface concerning the system and internet sites and SaaS applications, it is the ideal area for inserting the DLP. An company browser extension can function as a browser DLP, many thanks to its skill to deeply observe consumer things to do and the web website page execution. It can also implement steps like alerting and blocking perilous person actions.

Instance Browser DLP Insurance policies

Here are some examples of DLP procedures that are designed to respond to details area in a cloud environments:

  • Notify about private information getting attached to email web applications.
  • Blocking private file uploads to private Google Drives.
  • Blocking confidential file downloads to unmanaged products.

This manual is an important read through for any group working with info that is on the web. You can read it in this article.

Uncovered this posting appealing? This write-up is a contributed piece from one particular of our valued companions. Follow us on Twitter  and LinkedIn to study far more unique articles we put up.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «bianlian threat actors exploiting jetbrains teamcity flaws in ransomware attacks BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
Next Post: Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity PAM Essentials embracing the cloud: revolutionizing privileged access management with one identity»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.