Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Initial D, MF Ghost Manga Get Subaru and Subaru Sequel in July – News

June 7, 2025

Yamishibai: Japanese Ghost Stories Anime Gets 15th Season on July 13 – News

June 7, 2025

Egos, powers and reforms – Aminul’s challenge with Bangladesh cricket

June 7, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Empower Users and Protect Against GenAI Data Loss
Cybersecurity

Empower Users and Protect Against GenAI Data Loss

HarishBy HarishJune 6, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Jun 06, 2025The Hacker NewsArtificial Intelligence / Zero Trust

GenAI Data Loss

When generative AI tools became widely available in late 2022, it wasn’t just technologists who paid attention. Employees across all industries immediately recognized the potential of generative AI to boost productivity, streamline communication and accelerate work. Like so many waves of consumer-first IT innovation before it—file sharing, cloud storage and collaboration platforms—AI landed in the enterprise not through official channels, but through the hands of employees eager to work smarter.

Faced with the risk of sensitive data being fed into public AI interfaces, many organizations responded with urgency and force: They blocked access. While understandable as an initial defensive measure, blocking public AI apps is not a long-term strategy—it’s a stopgap. And in most cases, it’s not even effective.

Shadow AI: The Unseen Risk

The Zscaler ThreatLabz team has been tracking AI and machine learning (ML) traffic across enterprises, and the numbers tell a compelling story. In 2024 alone, ThreatLabz analyzed 36 times more AI and ML traffic than in the previous year, identifying over 800 different AI applications in use.

Blocking has not stopped employees from using AI. They email files to personal accounts, use their phones or home devices, and capture screenshots to input into AI systems. These workarounds move sensitive interactions into the shadows, out of view from enterprise monitoring and protections. The result? A growing blind spot is known as Shadow AI.

Blocking unapproved AI apps may make usage appear to drop to zero on reporting dashboards, but in reality, your organization isn’t protected; it’s just blind to what’s actually happening.

Lessons From SaaS Adoption

We’ve been here before. When early software as a service tool emerged, IT teams scrambled to control the unsanctioned use of cloud-based file storage applications. The answer wasn’t to ban file sharing though; rather it was to offer a secure, seamless, single-sign-on alternative that matched employee expectations for convenience, usability, and speed.

However, this time around the stakes are even higher. With SaaS, data leakage often means a misplaced file. With AI, it could mean inadvertently training a public model on your intellectual property with no way to delete or retrieve that data once it’s gone. There’s no “undo” button on a large language model’s memory.

Visibility First, Then Policy

Before an organization can intelligently govern AI usage, it needs to understand what’s actually happening. Blocking traffic without visibility is like building a fence without knowing where the property lines are.

We’ve solved problems like these before. Zscaler’s position in the traffic flow gives us an unparalleled vantage point. We see what apps are being accessed, by whom and how often. This real-time visibility is essential for assessing risk, shaping policy and enabling smarter, safer AI adoption.

Next, we’ve evolved how we deal with policy. Lots of providers will simply give the black-and-white options of “allow” or “block.” The better approach is context-aware, policy-driven governance that aligns with zero-trust principles that assume no implicit trust and demand continuous, contextual evaluation. Not every use of AI presents the same level of risk and policies should reflect that.

For example, we can provide access to an AI application with caution for the user or allow the transaction only in browser-isolation mode, which means users aren’t able to paste potentially sensitive data into the app. Another approach that works well is redirecting users to a corporate-approved alternative app which is managed on-premise. This lets employees reap productivity benefits without risking data exposure. If your users have a secure, fast, and sanctioned way to use AI, they won’t need to go around you.

Last, Zscaler’s data protection tools mean we can allow employees to use certain public AI apps, but prevent them from inadvertently sending out sensitive information. Our research shows over 4 million data loss prevention (DLP) violations in the Zscaler cloud, representing instances where sensitive enterprise data—such as financial data, personally identifiable information, source code, and medical data—was intended to be sent to an AI application, and that transaction was blocked by Zscaler policy. Real data loss would have occurred in these AI apps without Zscaler’s DLP enforcement.

Balancing Enablement With Protection

This isn’t about stopping AI adoption—it’s about shaping it responsibly. Security and productivity don’t have to be at odds. With the right tools and mindset, organizations can achieve both: empowering users and protecting data.

Learn more at zscaler.com/security

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleVTuber Usada Pekora Teased in Death Stranding 2 Game – Interest
Next Article Billy Joel documentary reveals he attempted suicide twice and was in a coma after affair with friend’s wife
Harish
  • Website
  • X (Twitter)

Related Posts

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

June 6, 2025

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam

June 6, 2025

Why More Security Leaders Are Selecting AEV

June 6, 2025

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

June 6, 2025

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials

June 5, 2025

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Initial D, MF Ghost Manga Get Subaru and Subaru Sequel in July – News

June 7, 2025

Yamishibai: Japanese Ghost Stories Anime Gets 15th Season on July 13 – News

June 7, 2025

Egos, powers and reforms – Aminul’s challenge with Bangladesh cricket

June 7, 2025

Building More Scalable GenAI Applications for Startups and Developers

June 7, 2025
Don't Miss
Blockchain

Bitcoin market of 2025 driven by stablecoin regulation: Finance Redefined

June 6, 20256 Mins Read

Despite a week of price consolidation for Bitcoin (BTC), emerging digital asset legislation may provide…

How to Earn Passive Income with Peer-to-Peer Lending

June 6, 2025

Mass data deletion by governments is accelerating.

June 6, 2025

Cointelegraph Bitcoin & Ethereum Blockchain News

June 6, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Building More Scalable GenAI Applications for Startups and Developers

June 7, 2025

2025 will be a ‘pivotal year’ for Meta’s augmented and virtual reality, says CTO

June 6, 2025

The case for AI co-founders, from less equity dilution to an infinite memory

June 6, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.