By Keith Ferrell
June 18, 2010
The biggest vulnerabilities in the enterprise might be items we see
every day -- and just don't think about.
Experts say that vulnerability assessments often overlook the everyday
dangers: Network-attached devices that aren't computers. Paper
documents. Passwords posted in plain view. Portable storage devices.
Most of these are technologies that would never be taken into account by
a traditional vulnerability scan. Yet they could lead to data leaks just
as surely as a keylogger or a data-stealing Trojan, experts say.
"Peripheral devices on the network may have capabilities the business
doesn't know of," says Kevin Brown, delivery manager for custom testing
at security assessment firm ICSA. "And those capabilities can create
Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada
July 24-29th, offering over 60 training sessions and 11 tracks of Briefings
from security industry elite. To sign up visit http://www.blackhat.com