Perimeter
7/29/2014
05:25 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Dark Reading Radio: Data Loss Prevention (DLP) Fail

Learn about newly found vulnerabilities in commercial and open-source DLP software in our latest episode of Dark Reading Radio with security researchers Zach Lanier and Kelly Lum.

You know that data loss prevention (DLP) system you count on to keep private and sensitive information from leaking outside the organization? It may well contain security bugs of its own, according to new research that will be presented next week at Black Hat USA in Las Vegas.

Security researchers Zach Lanier and Kelly Lum staged a bakeoff of sorts to study the actual security of these security tools and found a plethora of common security vulnerabilities such as cross-site scripting and cross-site request forgery, to name a few. Lanier, who is a senior security researcher at Duo Security, provides a sneak-peek at some of the surprising weaknesses in DLP product administrative and programmatic interfaces, as well as in their inspection engines.

So register now and listen to a fascinating interview on "Data Loss Prevention (DLP) FAIL." Have additional questions for our guest? Share them in the comments section below.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 10:12:43 AM
Re: Failure of Data Loss Prevention
Ryan, you can post that question in the Comment box below the show's page if you've registered. Then we can have Zach address it--even if you're not there. Thanks!

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 10:08:07 AM
Re: Failure of Data Loss Prevention
Thanks! Being the DLP administrator this will definitely be interesting. I did have a question that I think it stated below I could ask here for the broadcast. 

I can see DLP being a cloudy area when you use an email service that is cloudbase such as Office365.

My questions is:

Can DLP be applied to services that are in the cloud (example Office 365 and Symantec DLP) and if the third party states that it cannot are there regulations in place by compliance organizations to combat this statement? Any direction would be appreciated.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 9:57:18 AM
Re: Failure of Data Loss Prevention
@RyanSepe: Yes, we will have it archived later today. :) All of our shows are archived, actually. This is the DR Radio archive link: http://www.darkreading.com/dr-radio.asp
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/30/2014 | 9:47:50 AM
Re: Failure of Data Loss Prevention
I have a meeting at 1PM today. Is there going to be an archive where I can listen to the broadcast after? Thanks,
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:58:26 AM
Re: Failure of Data Loss Prevention
Me, too. Zach and Kelly Lum are still in working on this, so he may even have new info to share today as well as next week at Black Hat USA in Vegas.
theb0x
50%
50%
theb0x,
User Rank: Moderator
7/30/2014 | 8:50:30 AM
Re: Failure of Data Loss Prevention
Looking forward to the broadcast!
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/30/2014 | 8:08:45 AM
Re: Failure of Data Loss Prevention
It will be interesting to learn which DLP products and open-source programs were found to have security vulns. The researchers also plan to provide some mitigation/defense recommendations in their talk next week. 

Join us today at 1pm and you can ask Zach Lanier questions about his findings.
dlpexpert
50%
50%
dlpexpert,
User Rank: Apprentice
7/29/2014 | 6:13:32 PM
Failure of Data Loss Prevention
I think this verifies the switch up to GTB Technologies advanced DLP solutions  http://www.gtbtechnologies.com/en/news/gtb-technologies-announces-a-huge-increase-of-enterprises-switching-up-to-gtb-s-advanced-data-protection-dlp-solutions 
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?