Read Charles Fullwood’s article about why unstructured data is a unseen threat on Dark Reading :
Every day, IT security teams are inundated with data — security events, network flows, configuration information, and so on — which then must be collected and analyzed for potential vulnerabilities. Your team probably has a solid, established approach or even a documented strategy for doing this. If so, great. But is that enough?
Read his full article here.