The Attacker Within: How Hackers Are Targeting Enterprise Networks From the Inside Out
Click here to download now
Overview: As enterprise defenses evolve, so too do the attack vectors leveraged by those seeking to bypass such controls. We are entering an era where attackers are no longer working to punch a hole in the fortress surrounding enterprise IT assets from the outside. They don’t need to; they’re already inside. Thanks to the meteoric rise in the importance of Web-based traffic and a laundry list of vulnerabilities in Web-aware applications on the desktop, end users are now being turned into enablers for enterprise attacks. Convincing a trusting employee to visit a Web site is all that an attacker needs to do in order to access valuable data deep within a secure network.