<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Data_Loss_Protection</id>
		<title>Data Loss Protection - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Data_Loss_Protection"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Data_Loss_Protection&amp;action=history"/>
		<updated>2026-04-05T07:02:43Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Data_Loss_Protection&amp;diff=66484&amp;oldid=prev</id>
		<title>Dhruvsoi: Created page with 'To lose control over one's own data is one of the primal fears of the digital age. More than ever this applies in particular to the world of corporations and organizations with a…'</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Data_Loss_Protection&amp;diff=66484&amp;oldid=prev"/>
				<updated>2009-07-24T07:00:05Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#039;To lose control over one&amp;#039;s own data is one of the primal fears of the digital age. More than ever this applies in particular to the world of corporations and organizations with a…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;To lose control over one's own data is one of the primal fears of the digital age. More than ever this applies in particular to the world of corporations and organizations with all their trade secrets and marketing plans to be protected from leaking outside. To prevent such leakage is the promise of salvation of a new set of security tools called &amp;quot;Data Loss Protection&amp;quot; or &amp;quot;Extrusion Prevention&amp;quot; solutions. All relevant vendors are already offering such pieces (mostly by acquisition of smaller companies specialized in the field). This talk will discuss why the approach these solutions take will fail in most environments and which pre-requisites must be fulfilled before even thinking about such a solution. We will further discuss what can be done on a structural level to protect sensitive data and use the existing tool set of the infosec space.&lt;/div&gt;</summary>
		<author><name>Dhruvsoi</name></author>	</entry>

	</feed>