tag:blogger.com,1999:blog-5450224104490233733.post1751409294929264857..comments2012-01-22T10:42:37.680-08:00Comments on Inside Infosec: Why DLP is virtually uselessBogwitchhttp://www.blogger.com/profile/16231601488035817746noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-5450224104490233733.post-19140284081695337152012-01-22T10:42:37.680-08:002012-01-22T10:42:37.680-08:00Constructive input? Not really. You identified the...Constructive input? Not really. You identified the correct DLP. Well done.<br />The 80% is what the Sy industry quotes. My wording suggests you take it with a pinch of salt.<br />Users will find DLP circumvention methods, I did not cite any examples beyond that as it is as broad as it is long. If you want examples, read up.Bogwitchhttps://www.blogger.com/profile/16231601488035817746noreply@blogger.comtag:blogger.com,1999:blog-5450224104490233733.post-18491613681711087862012-01-16T10:22:42.454-08:002012-01-16T10:22:42.454-08:00What is this effluent drivel supposed to instill i...What is this effluent drivel supposed to instill in the reader exactly? I realize beauty is in the eye of the beholder and all that but DLP - being a Business disabler. Anyone reading that for the first time is going to be asking themselves what DLP is;<br /><br />Digital Light Processing (DLP) or Data Loss Prevention (DLP)<br /><br />Being a security orientated blog one presumes the later, "users will find workarounds that are below the radar!" Couldn't come up with a more definitive example?<br /><br />"More than 80% of information leakage is carried out by malicious insiders." erm no, a good percentage of that are insiders with loose lips who cant help but brag to co-workers or other interested parties that understand the raw data.<br /><br />Dross.Anonymousnoreply@blogger.com