Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Tech Insight: Getting Ready For Data Loss Prevention (DLP)
Newest First  |  Oldest First  |  Threaded View
AFORGIE750
50%
50%
AFORGIE750,
User Rank: Apprentice
4/7/2012 | 9:44:52 PM
re: Tech Insight: Getting Ready For Data Loss Prevention (DLP)
GǣAs an information security professional who spent the last few years working in the field with technical and non-technical stake holders on their data protection initiatives, I have to say that although these points are valid, it seems like another situation where the reader is being told what to do without being provided the practical steps that show them how.- -That hasnGt helped IT get an upper hand on DLP -projects in the past and it wonGt help much more now. -IGd recommend paying more attention to some of the topics that are often overlooked in during DLP projects, such as:
-
-+-------- Ensuring that all project stake holders have a consistent understanding of security principles and what communicates risk.- -
-+-------- Knowing the latest data breach trends to confirm where you are most likely to experience a high impact data breach and allocate resources accordingly.
-+-------- Understanding the Methodology and Execution Strategies of the different vendors.- Not everyone has the same vision for how the problem is solved, and itGs critical that you align with whomever you agree.-
-+-------- Determine what your requirements are to promote response automation.

-
Yesterday, I covered this in a live webcast which is now available on demand if you or anyone would be interested in viewing: http://www.websense.com/conten...



Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5615
PUBLISHED: 2020-08-04
Cross-site request forgery (CSRF) vulnerability in [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2020-5616
PUBLISHED: 2020-08-04
[Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01] [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] fre...
CVE-2020-5617
PUBLISHED: 2020-08-04
Privilege escalation vulnerability in SKYSEA Client View Ver.12.200.12n to 15.210.05f allows an attacker to obtain unauthorized privileges and modify/obtain sensitive information or perform unintended operations via unspecified vectors.
CVE-2020-11583
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
CVE-2020-11584
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.