Our Security Model is Broken
In an article entitled The Security Model is Broken in the February 2015 edition of SC Magazine
View ArticleAuditing More Network Devices Offline with Nessus
Let’s do a show of hands. How many network administrators go through a security audit without experiencing some anxiety?Anyone?I am guessing not many. And I can understand why.
View ArticleCybersecurity is a C-Level Activity
The information security field is a challenging place these days. With new and increasing threats every day, staying ahead of risks can feel like treading water.
View ArticleAn Apple A Day: Anthem Health Insurance Breach Exposes 80 Million Records
As the old adage goes, an apple a day keeps the doctor away.
View ArticleWho is Attending the White House Summit on Cybersecurity and Consumer...
The White House Summit on Cybersecurity and Consumer Protection is being held at Stanford University Friday February 13, 2015.
View ArticleThe Biggest Security Mistake You Can Make (and How to Avoid It)
In a new post on the SHI Blog, Tenable’s Marcus Ranum discusses the importance of doing regular data backups as a defense against security risks.
View ArticlePCI SSC Announces the End of SSL Usage for the Payment Card Industry
The Payment Card Industry Security Standards Council (PCI SSC) released a special bulletin on February 13, 2015 announcing impending revisions to
View ArticleTenable Introduces Agent-Based Scanning in Nessus Manager
Today, Tenable announced Nessus Agents, a new scanning method available in Nessus Manager, an improved version of the award-winning Nessus vulnerability management platform designed with enterprise...
View ArticleCounting Vulnerabilities
When talking with infosec professionals about gaining insight into how vulnerable their organisations are, I’ve noticed that many often reply with one simple statement: “We have N number of...
View ArticleIntroducing Nessus Manager and Nessus Cloud
Recently, Tenable announced the new Nessus® Manager and Nessus Cloud vulnerability management solutions. This article introduces you to these new solutions and their unique features.
View ArticleTenable Responds to CVE-2015-0204: FREAK Vulnerability
It seems that in recent history, the SSL library continues to give security teams plenty of opportunities to interface with systems/application administrators and vendors to upgrade SSL in their...
View ArticleCISOs Face Tough Challenges When Procuring Security Technologies
CISOs face several internal challenges when procuring security solutions:
View ArticleHot Off the Press: the 2015 Cyberthreat Defense Report
Recently, SC Magazine published a compelling article by Craig Shumard, The Security Model Is Broken, in which he declared:
View ArticleTenable’s Critical Cyber Controls for Secure Systems
With an ever changing dynamic IT landscape, it is critical you transform your information security strategy to be continuously responsive to the pressing demands of your business and tod
View ArticleKnowledge is Power: Computer Forensics to Detect and Respond to Breaches
High profile security breaches continue to occur (see infographic) in spite of the large investments that companies are making to secure their businesses and IT infr
View ArticleAuditing Multiple Databases with Nessus in a Single Scan
If you have been sitting on the fence debating about whether or not you should upgrade to Nessus v6.3, hopefully this blog will provide you with enough incentive to make the switch.
View ArticleSecuring Portable Devices and Sensitive Data in Healthcare
The high-profile healthcare breaches this year alone, as well as the growth of the lucrative market for healthcare information (“over $500 for a complete dos
View ArticleTenable Captures SC Magazine’s 2015 Best Buy
We are very proud to announce that SC Magazine recently reviewed Nessus and recognized it as a "Best Buy" in the 2015 Vulnerability Management category.The reviewer highlighted several key points:
View ArticleThe Network Doesn’t Lie
In his March 26, 2015 Network World opinion piece, In Cybersecurity, the Network Doesn’t Lie, Jon Oltsik, principal analyst with E
View ArticleCreating a Baseline for Nessus Configuration Auditing
The only thing that is constant is change, and yet the one thing that most humans resist at some level is change itself. But when it comes to IT systems or machines in general, we observe the exact...
View Article