In an article entitled The Security Model is Broken in the February 2015 edition of SC Magazine
Our Security Model is Broken
Auditing More Network Devices Offline with Nessus
Let’s do a show of hands. How many network administrators go through a security audit without experiencing some anxiety?
Anyone?
I am guessing not many. And I can understand why.
Cybersecurity is a C-Level Activity
An Apple A Day: Anthem Health Insurance Breach Exposes 80 Million Records
Who is Attending the White House Summit on Cybersecurity and Consumer Protection?
The White House Summit on Cybersecurity and Consumer Protection is being held at Stanford University Friday February 13, 2015.
The Biggest Security Mistake You Can Make (and How to Avoid It)
In a new post on the SHI Blog, Tenable’s Marcus Ranum discusses the importance of doing regular data backups as a defense against security risks.
PCI SSC Announces the End of SSL Usage for the Payment Card Industry
The Payment Card Industry Security Standards Council (PCI SSC) released a special bulletin on February 13, 2015 announcing impending revisions to
Tenable Introduces Agent-Based Scanning in Nessus Manager
Counting Vulnerabilities
Introducing Nessus Manager and Nessus Cloud
Tenable Responds to CVE-2015-0204: FREAK Vulnerability
CISOs Face Tough Challenges When Procuring Security Technologies
Hot Off the Press: the 2015 Cyberthreat Defense Report
Recently, SC Magazine published a compelling article by Craig Shumard, The Security Model Is Broken, in which he declared:
Tenable’s Critical Cyber Controls for Secure Systems
With an ever changing dynamic IT landscape, it is critical you transform your information security strategy to be continuously responsive to the pressing demands of your business and tod
Knowledge is Power: Computer Forensics to Detect and Respond to Breaches
High profile security breaches continue to occur (see infographic) in spite of the large investments that companies are making to secure their businesses and IT infr
Auditing Multiple Databases with Nessus in a Single Scan
If you have been sitting on the fence debating about whether or not you should upgrade to Nessus v6.3, hopefully this blog will provide you with enough incentive to make the switch.
Securing Portable Devices and Sensitive Data in Healthcare
The high-profile healthcare breaches this year alone, as well as the growth of the lucrative market for healthcare information (“over $500 for a complete dos
Tenable Captures SC Magazine’s 2015 Best Buy
We are very proud to announce that SC Magazine recently reviewed Nessus and recognized it as a "Best Buy" in the 2015 Vulnerability Management category.
The reviewer highlighted several key points:
The Network Doesn’t Lie
In his March 26, 2015 Network World opinion piece, In Cybersecurity, the Network Doesn’t Lie, Jon Oltsik, principal analyst with E
Creating a Baseline for Nessus Configuration Auditing
The only thing that is constant is change, and yet the one thing that most humans resist at some level is change itself. But when it comes to IT systems or machines in general, we observe the exact opposite behavior: IT systems change all the time.