6 Comments
User's avatar
William Walker's avatar

Great problem and you did my favorite thing. And included a potential solution. Beautiful. The depth and research were impressive

Suny Choudhary's avatar

Thank you! I'm glad you found it intense.

Tom Chaydun Music's avatar

Along with my other comment, I am both a current member of CompTIA and ISC2 for information services including cyber security and AI

Suny Choudhary's avatar

That is amazing. Looking forward to hearing more from you!

Tom Chaydun Music's avatar

Great article. The primary mechanism to stop this would be risks & gaps analysis and assessments and following up with the deployment of detection systems that legacy DLP systems are lacking. A layered Defense in Depth approach. Not to mention updated security awareness training for users as well on what is allowed on the enterprise.

Suny Choudhary's avatar

I agree. Thanks for giving it a read!