The endpoint and the end user continue to be the weakest links in most security infrastructures. Commonly used as a security tactic, blacklisting looks at known pieces of malware and adds to a list those bad applications from which users should be denied access.