Quantcast
Channel: Tenable Blog
Browsing all 1935 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Naughty or Nice: The Holidays Put Security Practices of Merchants to the Test

In less than two weeks, US consumers will engage in the annual holiday shopping frenzy known as Black Friday.

View Article


Image may be NSFW.
Clik here to view.

Regin Malware: Its Targets and How You Can Detect It

On the 24th of November 2014, a major anti-malware vendor released a report concerning a long running piece of backdoor Trojan malware, now called “Regin.” We at Tenable Network Security were aware of...

View Article


Image may be NSFW.
Clik here to view.

Is Your Mobile POS Secure?

The 2014 holiday season is upon us and with it, the forecast of billions in retail sales.

View Article

Image may be NSFW.
Clik here to view.

Auditing a Salesforce.com Account with Nessus

Imagine you woke up one day and realized that your top competitor had siphoned off a list of all your customers, sales leads, future customers, and product pricing. You might think that couldn’t happen...

View Article

Image may be NSFW.
Clik here to view.

Cisco and Tenable Integration Enables Swift Response to Vulnerable Hosts

About a month ago, I wrote a blog to understand customer interest in a unified framework that would enable multi-vendor, cross-platform collaboration for ident

View Article


Image may be NSFW.
Clik here to view.

The Five Stages of Security Grief


Gavin Millard is featured in the December 2014 issue of (IN)SECURE magazine for his lead article on The Five Stages of Security Grief.

View Article

Image may be NSFW.
Clik here to view.

Auditing NoSQL Databases (MongoDB) with Nessus v6

To SQL or NoSQL is the big debate among database experts these days. Both types of databases have fundamentally different architectures and support different use cases; hence, they have different pros...

View Article

Image may be NSFW.
Clik here to view.

Knowledge as a Defense Against Malware

Team Anti-Virus, an independent group of anti-virus researchers, published Ten Rules of Common Sense Computing and Virus Defense ten years ago to help educate network security personnel, end users, and...

View Article


Image may be NSFW.
Clik here to view.

Make 2015 a Breach-Free Year

With 2014 drawing to a close and the New Year almost upon us, it’s the perfect time to reflect on this year’s security events and to plan for changes in 2015.

View Article


Image may be NSFW.
Clik here to view.

Auditing Red Hat Enterprise Virtualization (RHEV) with Nessus v6

There was a time in early 2000 when the word "virtualization" was synonymous with VMware, and rightly so. After all, VMware started the second coming of this revolutionary technology after IBM.

View Article

Image may be NSFW.
Clik here to view.

“Countdown to Zero Day” is a Must Read

Recently there have been several great books that illustrate the importance of information security in today’s world, including Kevin Mitnick’s “Ghost in the Wires,” Andy Greenberg’s “This Machine...

View Article

Image may be NSFW.
Clik here to view.

PCI DSS and Security: The Podcast

In the first Down the Security Rabbithole podcast for 2015, Tenable’s Jeff Man joins the hosts in a lively and engaging discussion about the truths behind the Payment Card Industry Data Security...

View Article

Image may be NSFW.
Clik here to view.

Attribution is Hard, Part 1

In 1995 I landed my first independent consulting project: an incident response for an important financial institution in New York City.

View Article


Image may be NSFW.
Clik here to view.

The Federal Information Security Modernization Act of 2014

The Federal Information Security Management Act (FISMA) of 2002 was put into place to implement a framework for the effectiveness of information security controls for Federal information systems, to...

View Article

Image may be NSFW.
Clik here to view.

Attribution is Hard, Part 2

Last week in Attribution is Hard, Part 1, I described a classic hacking incident and discussed the challenges of establishing attribution.

View Article


Image may be NSFW.
Clik here to view.

Whats New in Nessus 6.2

This week, Tenable released a maintenance update for the Nessus vulnerability scanner. This update delivers several new features and some minor bug fixes. The new features are described here.

View Article

Image may be NSFW.
Clik here to view.

Implement Good Cyber Hygiene with Continuous Network Monitoring

View Article


Image may be NSFW.
Clik here to view.

Committing to the 12-Step Program of PCI DSS: Regularly Test Security

The Payment Card Industry Data Security Standard (PCI DSS) version 3.0 is now the de facto standard for measuring security programs for all merchants and service providers that participate in commerce...

View Article

Image may be NSFW.
Clik here to view.

Tenable Responds to CVE-2015-0235: GHOST (Updated)

A major vulnerability was disclosed today in the GNU C Library (“glibc”).

View Article

Image may be NSFW.
Clik here to view.

U.S. HHS Cracks Down on HIPAA Non-Compliance

The healthcare industry is one of the most heavily regulated business types today.

View Article
Browsing all 1935 articles
Browse latest View live