Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed.
The Common Vulnerability Scoring System is an industry standard, but has been around for a while.
[ It's time to take another look at security. Two former CIOs show you how to rethink your security strategy for today's world. Bonus: Available in PDF and e-book versions. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
The bad guys, however, aren't limiting themselves to the traditional perimeter attacks anymore. They're using spear phishing, phone calls and on-site visits and other techniques to get at corporate data.
To continue reading this article register now