Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:55 AM
Connect Directly

RSA Preview: Shutting Down Insiders

With the insider threat on the rise, data leakage technology takes higher profile at show

It's no secret the real enemy now lies within your network, whether the offending user is a disgruntled employee, the unsuspecting victim of a targeted attack, or just plain clueless. Either way, data can be sent or stolen from your enterprise and be a potential nightmare of lost and compromised intellectual property, and personal and sensitive information.

Data leakage tools to protect against this insider threat, whether it's malicious or inadvertent, will be headlining next week's RSA Conference in San Francisco:

  • First, McAfee will release a new report that confirms our biggest fear: Employees may pose a bigger threat than malicious attacks from the outside.

  • 8e6 Technologies will discuss plans to roll out a new data leakage appliance in about a month that watches outbound traffic and protects against inadvertent or malicious release of confidential data. It will be priced between $75 and $125 per user.

  • BigFix will debut its new data leak product, BigFix DLP that incorporates Provilla's software.

  • Websense will map out its plans for the market, now that it owns leak-prevention vendor Port Authority.

    It all boils down to the fact that security is not about the network perimeter anymore. Estimates range from 50- to 70 percent of all exploits are either initiated by, or somehow related to a user who bypasses perimeter security via email, the Internet, instant messaging, or other peer-to-peer venues, says Paul Myer, president and COO of 8e6 Technologies.

    "You've got to get a handle on data in any format that comes out and quarantine it before it leaves your network," Myer says. "And that doesn't have to be data you mark as confidential. You can also include data that's a specific format to make sure it doesn't go out electronically."

    Then there's the oh-so-convenient but oh-so-vulnerable USB ports and other movable media that can lift data from the organization or infect it. That's where a client product comes into the data leakage picture, which Myers says is the next frontier for 8e6. "Short of supergluing your USB ports, you need to really lock them down. That's what we're looking at in the future -- either [doing it] ourselves or through a strategic partnership."

    Dennis Szerszen, senior vice president for SecureWave, which sells whitelisting software that spells out exactly what devices and applications user can access, says securing USB sticks and other removable media is key. He says attackers have begun launching "deliverable" attacks where they steal and infect USB sticks with Trojans, for instance, to gather data or for other hacking purposes.

    The PC or endpoint on a stick -- where you plug your USB stick into a monitor at Starbucks, for instance -- will also pose some serious risks in the future, notes Szerszen, who will participate on an RSA panel that discusses that issue.

    But what about those "it won't happen to me" organizations that think they don't have much of value to lose? "It's a big error to think you don't have anything valuable," says Dave Drab, a principal for Xerox Global Services and former FBI agent who used to investigate the U.S. mafia, and later, terrorist cases.

    Drab, who is giving a presentation at RSA on securing trade secrets, says such information requires an additional layer of protection. And it's a matter of both locking them down with technology, as well as educating users on their defense. "Trade secrets are the final frontier of the information security evolution," he says. "They are an enormous part of a company's value. Look at the Googles of the world who live and thrive on their ideas."

    He suggests that enterprises create internal trade-secret councils made up of security and departmental representatives that can build a cohesive security strategy for their intellectual property.

    What's next for data leakage technology? Devin Redmond, director of Websense's security products group, says to watch for more holistic methods for dealing with data leakage.

    "Look for a more unified approach in protecting data and users, where you look for the data," he says. "Some vendors look at data in motion, some at the endpoint, and some at the data at rest.

    "A lot of the announcements and conversations will be around unifying those... and looking at data in use," he says.

    And beware. Once insider threat is better contained, attackers are likely to move up a level -- planting malware in the enterprise applications themselves, for instance, says Jason Anderson, vice president of engineering at Lancope.

    — Kelly Jackson Higgins, Senior Editor, Dark Reading

  • 8e6 Technologies
  • BigFix Inc.
  • Lancope Inc.
  • McAfee Inc. (NYSE: MFE)
  • SecureWave S.A.
  • Websense Inc. (Nasdaq: WBSN)
  • Xerox Corp. (NYSE: XRX) Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-10-20
    ** DISPUTED ** The BIOS configuration design on ASUS ROG Zephyrus M GM501GS laptops with BIOS 313 relies on the main battery instead of using a CMOS battery, which reduces the value of a protection mechanism in which booting from a USB device is prohibited. Attackers who have physical laptop access ...
    PUBLISHED: 2019-10-19
    The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
    PUBLISHED: 2019-10-19
    Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
    PUBLISHED: 2019-10-19
    templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
    PUBLISHED: 2019-10-18
    In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.