Taking the Pulse of Your Network: Fitbit® for Security
Continuous network monitoring is not a new concept in network security, but it is a growing trend.
View Article15 Ways Infosec Pros Turn Tech Talk into Business Language
When starting a new career, many eager security professionals think their job is simply to secure data and the network. Over time, they realize that strategy can be in conflict with the needs of the...
View ArticleCybersecurity Legislation Week 2015
Some people are calling this week a Cyber Legislation Week.
View ArticleTenable Announces the Industry’s First Assurance Report Cards in...
As a CISO, have you ever experienced the frustration of accurately assessing the security and risk posture of your IT environment, and communicating it effectively to executives in a timely manner?
View ArticleNessus in the Cloud
Tenable recently announced the availability of our world-renowned Nessus vulnerability management tool as an expanded cloud service.
View ArticleInsights from the 2015 Verizon DBIR
The 2015 Verizon Data Breach Investigations Report (DBIR) was published this week, and it’s full of insights on recent data breaches and recommendations to fortify your organization against the latest...
View ArticleThe Cultural Change of DevOps and Why You Should Embrace Nightmares
Prior to DevOps (the continuous operational merger between developers and IT operations), we were trying to do security within our system of constraints and...
View ArticleRejoice, Security is Finally a Feature. Now Let’s Automate It.
Stuff you used to see as point solutions have become features within firewalls and IDSes, said David Mortman (@mortman), Chief Security Architect for...
View ArticleOh No! Security Got What They Want from the Business
“Running security five years ago was much more difficult than it is today,” said Alex Hutton (@alexhutton), faculty at IANS, in our conversation...
View ArticleAn Effective Security Model for Startups That DOESN'T Involve Best Practices
In an article entitled, 15 Ways Infosec Pros Turn Tech Talk into Business Language, Mike Dahn (@mikd), co-founder of Security B-Sides,...
View ArticleIf Your CEO Asks, “How Secure Are We?” What Do You Say?
The night before the launch of the 2015 RSA Conference in San Francisco, I attended the Tenable ISE VIP Welcome Reception with T.E.N....
View ArticleCrafting the Right Answer to “How Secure Are We?”
How secure are we?“It’s a trick question [to ask, ‘How secure are we?’] People want to say we’re secure enough or we’re not...
View ArticleSecuring Big Data so You’re Not Fooled by Bogus Information
“When data gets really big, really massive scale, it becomes really hard to secure, because you’re talking about breaking down a lot of assumptions we...
View ArticleThe Essential Trinity for Security Awareness: Visibility, Threat Management,...
“We’ve got all the information coming in. The analytics platform is going to do useful things with that. Help us make our decisions. Help us...
View ArticleUse ‘Incidents’ as an Opportunity to Focus Development
“Take the opportunity in an incident to apply the skill for a specific problem with effort that’s isolated,” said Andy Ellis (@csoandy), CSO for...
View ArticleHaving the Hard Conversation Business Wants to Hear, But May Not Like
Security people need to be listened to, and they’re finally getting what they want. The topic of security has become so high profile that...
View ArticleTwo Minutes of the Most Frightening Things That Ever Appeared on a Network
If you work in IT or security you have unfortunately seen behavior cross your network that you did not invite. In an effort to hear...
View ArticleThe Best Cloud Security Advice in Two Minutes
If you don’t know much about cloud security, watch this video. If you know a ton about cloud security, watch it anyway. It’s a compilation...
View ArticleDetermining if the Cloud is a Better Solution Given Your Environment
At the 2015 RSA Conference, security evangelist Bruce Scheier challenged his audience: “Don’t ask if you should be in the cloud. Ask if...
View ArticleFor Your Chosen Cloud Provider, Make Demands Not Assumptions
There’s a false belief about cloud security that has been circulating for some time. Many mistakenly believe they can offset their security costs and...
View Article