How does steganography work and does it threaten enterprise data?
NIST just released revision 4 of SP 800-53, which, among other things, covers the threat
posed by steganography. How does steganography work, and
what threat does it pose to enterprises?