Security
--
Questions
--
Followers
Top Experts
Dear Experts,
All users require access to ChatGPT. As a security practice, is it recommended to allow only text-based use of ChatGPT and block file uploads at the firewall level. please advise.
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
case 1 office network : deep inspection of web traffic and setup policies for specific domains like chat.openai.com in the office network
case-2 users working from remote: there are some users who will have data in their laptops and they work from remote
should we have to look for two different DLP solution or all DLP supports this, please advise






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Netskope and Zscaler can best be though of as proxy servers located on the Internet. Software on each client device talks to the Netskope or Zscaler servers instead of directly to whatever website, such as Google, YouTube, Azure, AWS, etc.
Security
--
Questions
--
Followers
Top Experts
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.