Block the Prompt, Not the Work: The End of "Doctor No"
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要观点。 文章主要讨论企业安全中的“Doctor No”现象,即安全团队总是说“不”,这导致员工寻找绕过安全措施的方法。接着提到传统安全工具如端点代理、防火墙等的不足,无法有效监控现代工作环境中的风险。最后,文章提出新的安全标准应关注会话层面的治理,而不是设备,以实现更有效的数据保护和用户体验。 现在,我需要将这些要点浓缩到100字以内。要确保涵盖关键问题:传统安全方法的不足、员工的规避行为、新的治理标准以及安全角色的转变。 可能的结构是:指出传统方法的问题,员工规避行为带来的风险,然后提出新的解决方案和目标。 比如:“文章指出传统企业安全方法依赖‘阻止’策略,导致员工规避安全措施。传统工具如端点代理和防火墙无法有效监控现代工作环境中的风险。文章提出新的安全标准应关注会话层面的治理,而非设备,并强调实时数据保护和用户体验的重要性。” 检查字数是否在限制内,并确保内容准确传达文章的核心观点。 </think> 文章指出传统企业安全方法依赖“阻止”策略,导致员工规避安全措施。传统工具如端点代理和防火墙无法有效监控现代工作环境中的风险。文章提出新的安全标准应关注会话层面的治理,而非设备,并强调实时数据保护和用户体验的重要性。 2026-4-1 12:46:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Endpoint Security / Data Protection

There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build. It doesn’t enable. Its entire function is to say "No."

No to ChatGPT.

No to DeepSeek.

No to the file-sharing tool the product team swears by.

For years, this looked like security. But in 2026, "Doctor No" is no longer just a management headache – it is a systemic security liability. Because when you block the work, users don’t stop. They reroute.

The Tax-Evaders of Productivity

When security feels like a tax on efficiency, employees find a way to "evade" it.

The industry has long relied on Endpoint Agents to enforce control. But as any CISO knows, these agents come with a heavy "tax." They hook into the OS kernel, they’re invasive, they notoriously break during macOS updates, and they make high-performance machines run hot.

The result? Users find workarounds. Files move into personal Gmail. Prompts are pasted into unmanaged AI tools. This is the Workaround Economy – a shadow infrastructure that exists not despite your security, but because of it. And the defining characteristic of this economy is that it operates with zero organizational visibility.

The Illusion of Control: The "Theatrical" Stack

Most teams still default to blocking because their legacy tools were never built to do much else. It’s not that these capabilities don't exist; it's that they are architecturally untenable for modern web work.

  • The SSL Inspection Trap: Firewalls, Secure Web Gateways (SWG), and even many modern SASE/SSE solutions technically attempt to "see" encrypted traffic through SSL decryption. But in a world of certificate pinning and complex web app "plumbing," this brute-force approach is a high-risk trade-off. Because these tools sit between the user and the web, they frequently break the very tools – like Slack, WhatsApp, or high-performance GenAI interfaces – that the business relies on. For a CISO, the choice is binary and brutal: turn on inspection and break the user experience, or turn it off and remain blind.
  • The Visibility Gap: EDR sees machine-level processes, and legacy DLP scans files at rest. But for most organizations, the live, streaming browser session remains a black box. While some newer 'suite' extensions attempt to peek inside, they only work on managed devices where the IT team has total control. Even then, they often come with a hidden cost: micro-latencies that make typing feel 'laggy,' rendering errors that break complex web app interfaces, and heavy CPU usage that turns a high-end laptop into a space heater. And even still, they remain blind to the prompt typed on a contractor’s laptop, a partner’s browser, or an unmanaged home device—the exact places where sensitive data is most likely to leak before the user even clicks 'send'.
  • The Extension Jungle: You can block a URL, but can you see the browser extension silently harvesting credentials? Most stacks cannot.

Blocking a website while leaving the browser session unmonitored is Theatrical Security. It provides the appearance of a policy without the reality of protection.

The Law Firm Lesson: A Case of "Ghost" Compliance

A prominent U.S. law firm recently discovered the danger of this gap. When data sovereignty concerns arose around DeepSeek, they did what seemed right: they blocked the domain. IT closed the ticket. Leadership felt covered.

A subsequent visibility exercise told a different story.

Seventy percent of their users had already installed an AI "wrapper" extension. Because the extension executed entirely inside the browser session, it was invisible to the firewall and the endpoint agent. Corporate traffic was being silently routed through servers in China. No alert had fired. No policy had triggered.

They had blocked the website. They hadn't blocked the risk.

While satisfied to find this gap, that feeling was quickly overshadowed by the particular stress of discovering that a control you'd trusted was purely theatrical. The compliance implications could have been dire.

The New Standard: Secure the Session, Not the Device

The browser has become the new OS of work. Security that lives anywhere else is simply too far away from the "Point of Risk."

The standard in 2026 is moving away from invasive agents and toward Session-Level Governance. The goal is a toolset that provides surgical control – governing the data, not the destination.

This requires a standard of security that can:

  • Execute Prompt-Level DLP: Identifying and redacting sensitive code or PII in real-time, within the buffer, before the "Send" button is ever clicked.
  • Govern the Extension Layer: Identifying and risk-scoring the "silent" extensions that bypass domain blocks entirely.
  • Enforce Agentless Controls: Providing clipboard and upload governance that works on any browser, on any device (including BYOD and contractors), without the "kernel-hooking" performance tax that drives users toward workarounds.

From Gatekeeper to Enabler

The role of security teams is changing. Instead of defining themselves as “gatekeepers”, most successful security leaders are now becoming a visibility layer – one that enables the business to say "Yes" because they can finally see, and govern, what happens when people work.

The question is no longer whether your users are using AI. They are. The question is whether your security stack is helping them do it safely, or simply forcing them into the shadows.

Keep the good work. Block the bad. That is the standard now for the modern digital workplace.

To learn more about how to govern GenAI use – with prompt-level visibility and real-time DLP – without blocking the productivity your teams depend on, visit: redaccess.io/use-case-genai/

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html
如有侵权请联系:admin#unsafe.sh