Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

20% Of 'Broadly Shared' Data Contains Regulated Info
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
10/28/2014 | 12:15:01 PM
Re: The other Elastica
Netskope reported some recent research recently on the explosion of sharing activity recently. The data revealed sharing activity that went beyond what people typically think of sharing via cloud storage -- such as enterprise financial, human resources, project management and productivity apps . Interesting data. More here in a Dark Reading commentary  for whoever is interested. 
User Rank: Apprentice
10/28/2014 | 10:44:40 AM
Re: The other Elastica
I love the band Elastica! The songs Connection and Car Song consisted of many playlists and burned cds Sara, you have great taste in music. :)

Shadow IT is definitely a concern we've seen with many customers and with constant changes to regulatory compliance like PCI DSS and HIPAA, Shadow IT will need to be controlled and monitored closley but in a way that doesn't inhibit the business either. We want IT to be seen as a business enabler and operating in this environment is possible so long as IT is assessing, auditing and protecting data on the move. It also helps to have compliance and security awareness training in place that stripes people, process and techonology. All too often we see human error contributing to failed audits or breaches, which is unfortunate because most people are well intended. A littie information on what is considered sensitive data can go a long way. 

Thanks for covering a great topic.

Jessica Morrison, GRC Sr Product Marketing Manager, Dell
User Rank: Moderator
10/24/2014 | 2:00:27 PM
Re: The other Elastica
Nice, it's been awhile but I did own their CD back in the day. 

Shadow Data is indeed a huge concern, and most employees are probably guilty of at least one count of oversharing data that probably shouldn't be even stored in any cloud storage offering.  I've always been a fan of whitelabelling, putting data tags to hopefully reduce the ability for misuse of data, but the reality is that there ar eso many ways to circumvent systems and policies that this will always seem to be a headache for IT and security folks.
User Rank: Ninja
10/23/2014 | 7:54:54 PM
Changing the Format of Sensitive Data
While these statistics for over-shared data may appear small, there is another issue that is hinted at here not often talked about.  That is, the format of the data.  What makes certain types of data so attractive to share is the format used to store it.  For instance, the MP3 is so easily passed amongst users that millions of songs exchange hands everyday without a second thought.  The same is true of books in PDF format.  The nature of the "file" as we know it today, whether that is on a UNIX or Windows file system, contributes to this very over-sharing.

Now consider the alternative.  For all types of data that are regulated by nature, there is an opportunity to standardize how that is delivered, stored and viewed to not include "files", thus causing over-sharing to no longer be possible.  If not a file, then what?  Well, we shall see...  Add on top of this variable encryption and decryption schemes and biometric-based access and you could all but eliminate the misuse of regulated information.  Too expensive to implement?  I suspect that depends upon how much regulated data integrity is worth to you, and how much it costs every year to deal with cases of over-sharing.  


Thomas Claburn
Thomas Claburn,
User Rank: Ninja
10/23/2014 | 6:43:18 PM
Re: The other Elastica
If we're going to highlight British bands of yore, I'd vote for Shriekback (which is still around and about to release its 13th recording).

Sara Peters
Sara Peters,
User Rank: Author
10/23/2014 | 4:25:44 PM
The other Elastica
I know this has nothing to do with data security, but does anyone remember the British band Elastica? I listened to their first album incessantly in 1995. www.youtube.com/watch?v=ilKcXIFi-Rc

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-27
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption ...
PUBLISHED: 2022-05-27
The software may be vulnerable to both Un-Auth XML interaction and unauthenticated device enrollment.
PUBLISHED: 2022-05-27
The Master operator may be able to embed script tag in HTML with alert pop-up display cookie.
PUBLISHED: 2022-05-27
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
PUBLISHED: 2022-05-27
Multiple vulnerabilities in the web-based management interface of Cisco Common Services Platform Collector (CSPC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient va...