• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
data leakage prevention in the age of cloud computing: a

Data Leakage Prevention in the Age of Cloud Computing: A New Approach

You are here: Home / General Cyber Security News / Data Leakage Prevention in the Age of Cloud Computing: A New Approach
March 11, 2024

As the change of IT infrastructure to cloud-centered alternatives celebrates its 10-12 months anniversary, it gets clear that regular on-premises ways to facts security are getting obsolete. Relatively than guarding the endpoint, DLP remedies need to have to refocus their efforts to where by company facts resides – in the browser.

A new guide by LayerX titled “On-Prem is Useless. Have You Modified Your Web DLP Plan?” (download in this article) dives into this transition, detailing its root cause, feasible alternative paths forward and actionable implementation illustrations. After looking at the information, security and IT industry experts will be geared up with the relevant facts they require to update and up grade their DLP methods.

Information highlights consist of:

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Why DLP

The guideline commences with an clarification of the position of the DLP. DLPs defend facts from undesirable exposure by classification, pinpointing its sensitivity amount, and implementing protecting action. This is meant to enable businesses to detect and avoid knowledge breaches and other malicious activities and meet up with compliance polices.

What Has Altered for DLP and Corporate Info

However, DLPs ended up developed with on-prem environments in head. In these scenarios, details that leaves the ecosystem is usually hooked up to an email or a components gadget. For that reason, DLPs have been ordinarily put on the gateway concerning the corporate network and the community Internet. The rise of SaaS apps and web site use requires an approach that addresses company facts in its new area: on line.

3 Details Defense Paths Ahead

To address this gap, there are a few approaches security and IT groups can function.

1. No Improve – Applying DLPs options as they are when limiting info uploads to insecure online areas. As described, this alternative is partly productive.

2. CASB DLP – Inspecting files with SaaS applications and imposing insurance policies between apps and products and applications. This answer is productive for some sanctioned apps, but not for all or for unsanctioned ones.

3. Browser DLP – Checking info action at the transaction issue. This alternative enforces procedures throughout all vectors – equipment, apps and the browser.

Considering the fact that the browser is the interface concerning the system and internet sites and SaaS applications, it is the ideal area for inserting the DLP. An company browser extension can function as a browser DLP, many thanks to its skill to deeply observe consumer things to do and the web website page execution. It can also implement steps like alerting and blocking perilous person actions.

Instance Browser DLP Insurance policies

Here are some examples of DLP procedures that are designed to respond to details area in a cloud environments:

  • Notify about private information getting attached to email web applications.
  • Blocking private file uploads to private Google Drives.
  • Blocking confidential file downloads to unmanaged products.

This manual is an important read through for any group working with info that is on the web. You can read it in this article.

Uncovered this posting appealing? This write-up is a contributed piece from one particular of our valued companions. Follow us on Twitter  and LinkedIn to study far more unique articles we put up.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «bianlian threat actors exploiting jetbrains teamcity flaws in ransomware attacks BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
Next Post: Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity PAM Essentials embracing the cloud: revolutionizing privileged access management with one identity»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.