Perimeter
7/29/2014
05:25 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Dark Reading Radio: Data Loss Prevention (DLP) Fail

Learn about newly found vulnerabilities in commercial and open-source DLP software in our latest episode of Dark Reading Radio with security researchers Zach Lanier and Kelly Lum.

You know that data loss prevention (DLP) system you count on to keep private and sensitive information from leaking outside the organization? It may well contain security bugs of its own, according to new research that will be presented next week at Black Hat USA in Las Vegas.

Security researchers Zach Lanier and Kelly Lum staged a bakeoff of sorts to study the actual security of these security tools and found a plethora of common security vulnerabilities such as cross-site scripting and cross-site request forgery, to name a few. Lanier, who is a senior security researcher at Duo Security, provides a sneak-peek at some of the surprising weaknesses in DLP product administrative and programmatic interfaces, as well as in their inspection engines.

So register now and listen to a fascinating interview on "Data Loss Prevention (DLP) FAIL." Have additional questions for our guest? Share them in the comments section below.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 10:12:43 AM
Re: Failure of Data Loss Prevention
Ryan, you can post that question in the Comment box below the show's page if you've registered. Then we can have Zach address it--even if you're not there. Thanks!

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 10:08:07 AM
Re: Failure of Data Loss Prevention
Thanks! Being the DLP administrator this will definitely be interesting. I did have a question that I think it stated below I could ask here for the broadcast. 

I can see DLP being a cloudy area when you use an email service that is cloudbase such as Office365.

My questions is:

Can DLP be applied to services that are in the cloud (example Office 365 and Symantec DLP) and if the third party states that it cannot are there regulations in place by compliance organizations to combat this statement? Any direction would be appreciated.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 9:57:18 AM
Re: Failure of Data Loss Prevention
@RyanSepe: Yes, we will have it archived later today. :) All of our shows are archived, actually. This is the DR Radio archive link: http://www.darkreading.com/dr-radio.asp
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 9:47:50 AM
Re: Failure of Data Loss Prevention
I have a meeting at 1PM today. Is there going to be an archive where I can listen to the broadcast after? Thanks,
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:58:26 AM
Re: Failure of Data Loss Prevention
Me, too. Zach and Kelly Lum are still in working on this, so he may even have new info to share today as well as next week at Black Hat USA in Vegas.
theb0x
50%
50%
theb0x,
User Rank: Ninja
7/30/2014 | 8:50:30 AM
Re: Failure of Data Loss Prevention
Looking forward to the broadcast!
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:08:45 AM
Re: Failure of Data Loss Prevention
It will be interesting to learn which DLP products and open-source programs were found to have security vulns. The researchers also plan to provide some mitigation/defense recommendations in their talk next week. 

Join us today at 1pm and you can ask Zach Lanier questions about his findings.
dlpexpert
50%
50%
dlpexpert,
User Rank: Strategist
7/29/2014 | 6:13:32 PM
Failure of Data Loss Prevention
I think this verifies the switch up to GTB Technologies advanced DLP solutions  http://www.gtbtechnologies.com/en/news/gtb-technologies-announces-a-huge-increase-of-enterprises-switching-up-to-gtb-s-advanced-data-protection-dlp-solutions 
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.