Aug 01, 2008
Download As enterprise defenses evolve, so too do the attack vectors leveraged by those seeking to bypass such controls. We are entering an era where attackers are no longer working to punch a hole in the fortress surrounding enterprise IT assets from the outside. They don�t need to; they�re already inside. Thanks to the meteoric rise in the importance of Web-based traffic and a laundry list of vulnerabilities in Web-aware applications on the desktop, end users are now being turned into enablers for enterprise attacks. Convincing a trusting employee to visit a Web site is all that an attacker needs to do in order to access valuable data deep within a secure network.