Tenable Network Security Podcast Episode 156 - "WordPress Vulnerabilities,...
Welcome to the Tenable Network Security Podcast Episode 156
View ArticleSecurityCenter 4.6.2 Provides Enhanced CyberScope Monitoring and Reporting
SecurityCenter already supports extensive CyberScope reporting and monitoring with unique combination of active as well as passive scanning. In previous releases, a separate utility was required to...
View ArticleAuditing Microsoft Office Configurations Using Nessus
Microsoft® Office® is ubiquitous in today’s work environment. Although MS Office applications offer many security configuration options that can reduce the likelihood of exploitation, the default...
View ArticleTenable Enhances SecurityCenter Reporting and Data Manipulation
SecurityCenter release 4.6.2 enhances monitoring and reporting capabilities to enable customers to easily review security and compliance data. In addition to the CyberScope specific reporting and...
View ArticleU.S. Navy sees 110K Cyber Attacks Every Hour: Tenable Network Security’s take...
According to a recent report, the U.S. Navy sees 110,000 cyber attacks every hour. In October, the world’s largest Internet search and advertising service warned thousands of users to beware of...
View ArticleTenable Network Security Podcast 157 - "Apple TV, Samba Vulnerabilities"
Welcome to the Tenable Network Security Podcast Episode 157AnnouncementsPatch management in a world of IPv6 IT resourcesWe're hiring! - Visit the Tenable website for more information about open positions.
View ArticleNessus 5.0.3 Is Now Available
Nessus 5.0.3 is now available for download. This update contains some new capabilities, as well as bug, stability, and security fixes.
View ArticleActive and Passive Mandiant APT1 Detection
The Mandiant APT1 report contains a tremendous amount of detail about attacker techniques, indicators of compromise, and possible adversaries. Most interesting was the large amount of technical detail...
View ArticleTenable Network Security Podcast Episode 158 - "Microsoft, VMware, & Adobe...
Welcome to the Tenable Network Security Podcast Episode 158AnnouncementsConsumers support a federal cybersecurity policy, survey saysAmericans Willing to Spend More to Thwart Cyber Attacks: Survey
View ArticleNessus Now Audits Palo Alto Networks PAN-OS Configurations
Tenable Nessus ProfessionalFeed customers can now audit the configuration of PAN-OS™-based Palo Alto Networks firewalls. Nessus can audit the firewall operational configurations and allow Palo Alto...
View ArticleWe have Microsoft Tuesday, so how long until we have Indicator Wednesday?
Recently, Tenable's Research team created Nessus checks and log searches to look for indicators specified in the Mandiant APT1 report. Our response was not unlike a typical Microsoft Tuesday afternoon...
View ArticleTenable Network Security Podcast Episode 159 - "Auditing & Hardening Palo...
Welcome to the Tenable Network Security Podcast Episode 159AnnouncementsVideo: Nessus Configuration & Compliance AuditingTenable Network Security Receives 5-Star Rating from SC Magazine
View ArticleTenable’s Paul Asadoorian and Jack Daniel Win 2013 Social Security Blogger...
Paul Asadoorian (Tenable product evangelist) and Jack Daniel (Tenable technical product manager) have won 2013 Social Security Blogger Awards. PaulDotCom won in the ‘Best Security Podcast” category,...
View ArticleTenable Network Security Podcast Episode 160 - "RSA Roundup, Vulnerability...
Welcome to the Tenable Network Security Podcast Episode 160AnnouncementsTenable Network Security Named as SC Magazine's 2013 Excellence Award Winner for Best Enterprise Security SolutionTenable Network...
View ArticleInformation Sharing: Learn From Past Mistakes
I've been asked repeatedly for my opinion about the APT1 report, and every time I try to respond I find myself waffling. The reason is simple: I think the report is a good thing, a sign of deep...
View ArticleComments and Commenting Policy
I believe that one of the things that gives a blog life and interest is its commentariat. This is not a free-for-all zone, however, so comments are moderated (for appropriateness, spam blocking, etc)....
View ArticleSearching for Custom Malicious File Hashes with Nessus
The Nessus malicious process detection plugins were recently enhanced to allow for searching with custom file hash lists. This allows organizations to add their own sources of malicious file hashes...
View ArticleNew "Geeking Out" Interview Series
In case you didn't know, I have been hosting a series of "Geeking Out..." interviews, with a couple of my friends in the industry. What I want to do with the series is conduct focused interviews with...
View ArticleTenable Network Security Podcast Episode 161 - "Malware Detection, Virtual...
Welcome to the Tenable Network Security Podcast Episode 161AnnouncementsTenable CSO praises APT1 report as a standard for information sharingWe're hiring! - Visit the Tenable website for more...
View ArticleTenable Network Security Podcast Episode 162 - "CVSS Scoring Update, Know...
Welcome to the Tenable Network Security Podcast Episode 162AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Check out our video channel on YouTube which...
View Article