Perimeter
7/29/2014
05:25 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Dark Reading Radio: Data Loss Prevention (DLP) Fail

Learn about newly found vulnerabilities in commercial and open-source DLP software in our latest episode of Dark Reading Radio with security researchers Zach Lanier and Kelly Lum.

You know that data loss prevention (DLP) system you count on to keep private and sensitive information from leaking outside the organization? It may well contain security bugs of its own, according to new research that will be presented next week at Black Hat USA in Las Vegas.

Security researchers Zach Lanier and Kelly Lum staged a bakeoff of sorts to study the actual security of these security tools and found a plethora of common security vulnerabilities such as cross-site scripting and cross-site request forgery, to name a few. Lanier, who is a senior security researcher at Duo Security, provides a sneak-peek at some of the surprising weaknesses in DLP product administrative and programmatic interfaces, as well as in their inspection engines.

So register now and listen to a fascinating interview on "Data Loss Prevention (DLP) FAIL." Have additional questions for our guest? Share them in the comments section below.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 10:12:43 AM
Re: Failure of Data Loss Prevention
Ryan, you can post that question in the Comment box below the show's page if you've registered. Then we can have Zach address it--even if you're not there. Thanks!

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 10:08:07 AM
Re: Failure of Data Loss Prevention
Thanks! Being the DLP administrator this will definitely be interesting. I did have a question that I think it stated below I could ask here for the broadcast. 

I can see DLP being a cloudy area when you use an email service that is cloudbase such as Office365.

My questions is:

Can DLP be applied to services that are in the cloud (example Office 365 and Symantec DLP) and if the third party states that it cannot are there regulations in place by compliance organizations to combat this statement? Any direction would be appreciated.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 9:57:18 AM
Re: Failure of Data Loss Prevention
@RyanSepe: Yes, we will have it archived later today. :) All of our shows are archived, actually. This is the DR Radio archive link: http://www.darkreading.com/dr-radio.asp
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 9:47:50 AM
Re: Failure of Data Loss Prevention
I have a meeting at 1PM today. Is there going to be an archive where I can listen to the broadcast after? Thanks,
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:58:26 AM
Re: Failure of Data Loss Prevention
Me, too. Zach and Kelly Lum are still in working on this, so he may even have new info to share today as well as next week at Black Hat USA in Vegas.
theb0x
50%
50%
theb0x,
User Rank: Moderator
7/30/2014 | 8:50:30 AM
Re: Failure of Data Loss Prevention
Looking forward to the broadcast!
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:08:45 AM
Re: Failure of Data Loss Prevention
It will be interesting to learn which DLP products and open-source programs were found to have security vulns. The researchers also plan to provide some mitigation/defense recommendations in their talk next week. 

Join us today at 1pm and you can ask Zach Lanier questions about his findings.
dlpexpert
50%
50%
dlpexpert,
User Rank: Apprentice
7/29/2014 | 6:13:32 PM
Failure of Data Loss Prevention
I think this verifies the switch up to GTB Technologies advanced DLP solutions  http://www.gtbtechnologies.com/en/news/gtb-technologies-announces-a-huge-increase-of-enterprises-switching-up-to-gtb-s-advanced-data-protection-dlp-solutions 
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.