Real Trojan Horses — A Case for Independently Testing Third Party Appliances

Intro

Would you plug a device into your DMZ or trusted server VLAN that someone handed you without looking at it first? This is the very definition of a rogue device, after-all. You probably want to have some control over or at least visibility into the device to know if operating system and software packages are patched, as part…