http://www.darkreading.com/vulnerability_management/security/perimeter/showArticle.jhtml?articleID=225700674 By Keith Ferrell Contributing Writer DarkReading June 18, 2010 The biggest vulnerabilities in the enterprise might be items we see every day -- and just don't think about. Experts say that vulnerability assessments often overlook the everyday dangers: Network-attached devices that aren't computers. Paper documents. Passwords posted in plain view. Portable storage devices. Most of these are technologies that would never be taken into account by a traditional vulnerability scan. Yet they could lead to data leaks just as surely as a keylogger or a data-stealing Trojan, experts say. "Peripheral devices on the network may have capabilities the business doesn't know of," says Kevin Brown, delivery manager for custom testing at security assessment firm ICSA. "And those capabilities can create security vulnerabilities." [...] _________________________________________________________________ Attend Black Hat USA 2010, hosted at Caesars Palace in Las Vegas, Nevada July 24-29th, offering over 60 training sessions and 11 tracks of Briefings from security industry elite. To sign up visit http://www.blackhat.comReceived on Mon Jun 21 2010 - 22:26:39 PDT
This archive was generated by hypermail 2.2.0 : Mon Jun 21 2010 - 22:33:55 PDT