Recent evidence of the new BlueKeep Windows vulnerability is an excellent and scary example of the need for enterprises to have thorough, accurate and current visibility into all the devices in use by their employees and contractors.
Here’s a scenario that could happen: Joe Smith decides to work at home one night and rather than bringing home the most recent corporate-issued device, he uses an older corporate device with an earlier version of Windows – a device he was issued a few years earlier and ‘forgot’ to return. As it turns out BlueKeep is designed to exploit this version of Windows and does. Joe then sends an email into the corporate network. Another employee opens the email without paying close attention and BlueKeep has now made its way into the enterprise.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.