AOH :: ISNQ6414.HTM

Looking For Vulns In All The Right Places? Experts Say You Might Be Missing A Few




Looking For Vulns In All The Right Places? Experts Say You Might Be Missing A Few
Looking For Vulns In All The Right Places? Experts Say You Might Be Missing A Few



http://www.darkreading.com/vulnerability_management/security/perimeter/showArticle.jhtml?articleID=225700674 

By Keith Ferrell
Contributing Writer
DarkReading
June 18, 2010 

The biggest vulnerabilities in the enterprise might be items we see 
every day -- and just don't think about.

Experts say that vulnerability assessments often overlook the everyday 
dangers: Network-attached devices that aren't computers. Paper 
documents. Passwords posted in plain view. Portable storage devices.

Most of these are technologies that would never be taken into account by 
a traditional vulnerability scan. Yet they could lead to data leaks just 
as surely as a keylogger or a data-stealing Trojan, experts say.

"Peripheral devices on the network may have capabilities the business 
doesn't know of," says Kevin Brown, delivery manager for custom testing 
at security assessment firm ICSA. "And those capabilities can create 
security vulnerabilities."

[...]


_________________________________________________________________
Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada
July 24-29th, offering over 60 training sessions and 11 tracks of Briefings
from security industry elite. To sign up visit http://www.blackhat.com 

Site design & layout copyright © 1986-2014 CodeGods