The very devices organizations rely on to enforce security policy are now among the least monitored, and most rapidly exploited, assets in the environment.