Data loss protection (DLP) has traditionally been seen as an endpoint and network problem: equipment installed agents, file inspection and traffic monitoring seemed sufficient. However, the massive shift of workflows to web applications and browser-based tools has created a critical blind spot in many security strategies. Recent studies point out that a significant fraction of sensitive file loads end up in unsanctioned accounts, confirming that much of the risk occurs within the browser session and outside the reach of traditional DLPs ( see report).
The real problem is not just that users upload files: it is that many leaks occur without a detectable "moving" file. Copy and paste code, write data on web forms or enter information in IA tool tips are activities that generate little or no network telemetry that a proxy or network DLP can correlate. So, actions in the context of the browser session - clipboard, input forms and uploads - require contextual visibility that conventional approaches do not provide.

The operational and regulatory implications are tangible. Companies with data subject to GDPR, HIPAA or confidentiality agreements can see unnoticed exfiltrations to public IA services or personal accounts, transforming a human error into a legal and reputational incident. In addition, the proliferation of Shadow accounts and the normalization of the use of personal SaaS tools increase complexity: from the perspective of a traditional DLP, the activity in permitted domains may seem legitimate even if the true destination is a non-corporate account.
In view of this scenario it is appropriate to rethink the control architecture: It is not a question of replacing existing DLPs, but of supplementing them. with browser-oriented capabilities. Browser-native solutions allow to inspect real-time interactions, to correlate the origin of the data (which app or repository generated it), to distinguish whether the target account is corporate or personal and to act inline with blocks, warnings or automatic encryption when risk is detected. This approach changes the detection of reactive to preventive, because it intervenes at the point of interaction of the user.
For security teams that want to reduce this blind spot, a practical road map should first include a diagnosis: map what web applications and extensions employees use, quantify the frequency of uploads and paste events, and record more common destinations. From there, it is recommended to pilot browser- native controls in reduced groups, measure block rates and false positive, and adjust classification policies and risk thresholds. Integrating these signals with IMS and incident management systems improves traceability and accelerates response.
You must not lose sight of the challenges: intervening in the browser involves managing privacy, minimizing impact on the user experience and ensuring compatibility with multiple browsers and working environments. This is why it is critical to involve technical techniques with governance: clear policies on personal accounts, specific training for developers and product equipment, and legal reviews on evidence conservation and sensitive data processing before deploying monitoring in sessions.

The ideal architecture combines controls: SSO and identity detection to distinguish accounts, CASB or Cloud DLP for sanctioned environments, and browser inspection capabilities to govern real-time interactions. This mixture allows block the use of a personal account in a critical action, warn the user at risk and generate forensic evidence for further investigation. Policy and good practice resources, such as the NIST security control guides, are useful for setting these technical decisions within a mature control programme ( NIST SP 800-53).
In addition to technology, organizational culture counts: educating about why private code extracts should not be attached to IA prompts, why PHI should not be stored in personal clouds and how to report errors without fear of sanctions reduces the probability of escape. To better understand the risks inherent in web applications and data entry in forms, it is appropriate to consult web security references such as those of OWASP, which help to prioritize mitigation in the application layer ( OWASP Top Ten).
In short, the loss of visibility in the browser is a strategic gap that no longer supports the excuse of "we have deployed DLP." Organizations should incorporate contextual controls within the browser, coordinate those controls with their existing security cell, adapt policies and processes, and measure efficiency metrics. Only with this combination will it be possible to transform daily and invisible actions into manageable signals that reduce the real risk of data exfiltration.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...