Naughty or Nice: The Holidays Put Security Practices of Merchants to the Test
In less than two weeks, US consumers will engage in the annual holiday shopping frenzy known as Black Friday.
View ArticleRegin Malware: Its Targets and How You Can Detect It
On the 24th of November 2014, a major anti-malware vendor released a report concerning a long running piece of backdoor Trojan malware, now called “Regin.” We at Tenable Network Security were aware of...
View ArticleIs Your Mobile POS Secure?
The 2014 holiday season is upon us and with it, the forecast of billions in retail sales.
View ArticleAuditing a Salesforce.com Account with Nessus
Imagine you woke up one day and realized that your top competitor had siphoned off a list of all your customers, sales leads, future customers, and product pricing. You might think that couldn’t happen...
View ArticleCisco and Tenable Integration Enables Swift Response to Vulnerable Hosts
About a month ago, I wrote a blog to understand customer interest in a unified framework that would enable multi-vendor, cross-platform collaboration for ident
View ArticleThe Five Stages of Security Grief
Gavin Millard is featured in the December 2014 issue of (IN)SECURE magazine for his lead article on The Five Stages of Security Grief.
View ArticleAuditing NoSQL Databases (MongoDB) with Nessus v6
To SQL or NoSQL is the big debate among database experts these days. Both types of databases have fundamentally different architectures and support different use cases; hence, they have different pros...
View ArticleKnowledge as a Defense Against Malware
Team Anti-Virus, an independent group of anti-virus researchers, published Ten Rules of Common Sense Computing and Virus Defense ten years ago to help educate network security personnel, end users, and...
View ArticleMake 2015 a Breach-Free Year
With 2014 drawing to a close and the New Year almost upon us, it’s the perfect time to reflect on this year’s security events and to plan for changes in 2015.
View ArticleAuditing Red Hat Enterprise Virtualization (RHEV) with Nessus v6
There was a time in early 2000 when the word "virtualization" was synonymous with VMware, and rightly so. After all, VMware started the second coming of this revolutionary technology after IBM.
View Article“Countdown to Zero Day” is a Must Read
Recently there have been several great books that illustrate the importance of information security in today’s world, including Kevin Mitnick’s “Ghost in the Wires,” Andy Greenberg’s “This Machine...
View ArticlePCI DSS and Security: The Podcast
In the first Down the Security Rabbithole podcast for 2015, Tenable’s Jeff Man joins the hosts in a lively and engaging discussion about the truths behind the Payment Card Industry Data Security...
View ArticleAttribution is Hard, Part 1
In 1995 I landed my first independent consulting project: an incident response for an important financial institution in New York City.
View ArticleThe Federal Information Security Modernization Act of 2014
The Federal Information Security Management Act (FISMA) of 2002 was put into place to implement a framework for the effectiveness of information security controls for Federal information systems, to...
View ArticleAttribution is Hard, Part 2
Last week in Attribution is Hard, Part 1, I described a classic hacking incident and discussed the challenges of establishing attribution.
View ArticleWhats New in Nessus 6.2
This week, Tenable released a maintenance update for the Nessus vulnerability scanner. This update delivers several new features and some minor bug fixes. The new features are described here.
View ArticleCommitting to the 12-Step Program of PCI DSS: Regularly Test Security
The Payment Card Industry Data Security Standard (PCI DSS) version 3.0 is now the de facto standard for measuring security programs for all merchants and service providers that participate in commerce...
View ArticleTenable Responds to CVE-2015-0235: GHOST (Updated)
A major vulnerability was disclosed today in the GNU C Library (“glibc”).
View ArticleU.S. HHS Cracks Down on HIPAA Non-Compliance
The healthcare industry is one of the most heavily regulated business types today.
View Article