Perimeter
7/29/2014
05:25 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Dark Reading Radio: Data Loss Prevention (DLP) Fail

Learn about newly found vulnerabilities in commercial and open-source DLP software in our latest episode of Dark Reading Radio with security researchers Zach Lanier and Kelly Lum.

You know that data loss prevention (DLP) system you count on to keep private and sensitive information from leaking outside the organization? It may well contain security bugs of its own, according to new research that will be presented next week at Black Hat USA in Las Vegas.

Security researchers Zach Lanier and Kelly Lum staged a bakeoff of sorts to study the actual security of these security tools and found a plethora of common security vulnerabilities such as cross-site scripting and cross-site request forgery, to name a few. Lanier, who is a senior security researcher at Duo Security, provides a sneak-peek at some of the surprising weaknesses in DLP product administrative and programmatic interfaces, as well as in their inspection engines.

So register now and listen to a fascinating interview on "Data Loss Prevention (DLP) FAIL." Have additional questions for our guest? Share them in the comments section below.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 10:12:43 AM
Re: Failure of Data Loss Prevention
Ryan, you can post that question in the Comment box below the show's page if you've registered. Then we can have Zach address it--even if you're not there. Thanks!

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 10:08:07 AM
Re: Failure of Data Loss Prevention
Thanks! Being the DLP administrator this will definitely be interesting. I did have a question that I think it stated below I could ask here for the broadcast. 

I can see DLP being a cloudy area when you use an email service that is cloudbase such as Office365.

My questions is:

Can DLP be applied to services that are in the cloud (example Office 365 and Symantec DLP) and if the third party states that it cannot are there regulations in place by compliance organizations to combat this statement? Any direction would be appreciated.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 9:57:18 AM
Re: Failure of Data Loss Prevention
@RyanSepe: Yes, we will have it archived later today. :) All of our shows are archived, actually. This is the DR Radio archive link: http://www.darkreading.com/dr-radio.asp
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 9:47:50 AM
Re: Failure of Data Loss Prevention
I have a meeting at 1PM today. Is there going to be an archive where I can listen to the broadcast after? Thanks,
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:58:26 AM
Re: Failure of Data Loss Prevention
Me, too. Zach and Kelly Lum are still in working on this, so he may even have new info to share today as well as next week at Black Hat USA in Vegas.
theb0x
50%
50%
theb0x,
User Rank: Ninja
7/30/2014 | 8:50:30 AM
Re: Failure of Data Loss Prevention
Looking forward to the broadcast!
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:08:45 AM
Re: Failure of Data Loss Prevention
It will be interesting to learn which DLP products and open-source programs were found to have security vulns. The researchers also plan to provide some mitigation/defense recommendations in their talk next week. 

Join us today at 1pm and you can ask Zach Lanier questions about his findings.
dlpexpert
50%
50%
dlpexpert,
User Rank: Strategist
7/29/2014 | 6:13:32 PM
Failure of Data Loss Prevention
I think this verifies the switch up to GTB Technologies advanced DLP solutions  http://www.gtbtechnologies.com/en/news/gtb-technologies-announces-a-huge-increase-of-enterprises-switching-up-to-gtb-s-advanced-data-protection-dlp-solutions 
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!