Mr. Robot and Tenable
At Tenable, we’re huge fans of USA’s cable series, Mr. Robot. The show follows Elliot Alderson, a talented, yet troubled, security engineer at Allsafe Cybersecurity who connects with people by...
View ArticleThe Security Model is Broken, Part 5: IoT Security
Billions of IoT devices are not secureThe Internet of Things (IoT) is rapidly growing, but security is lagging behind. Millions of cars and almost a billion smart phones are vulnerable to some sort of...
View ArticleSeeing the Forest and the Trees
A change in perspective can reveal new threatsWe’ve all heard the saying about missing the forest for the trees many times, and network security professionals tend to “get into the weeds” when...
View ArticleScaling up Tenable
Discerning CISOs worldwide increasingly view Tenable products as the gold standard for centrally managing and improving their security posture amidst an ever-worsening threat landscape.And while we...
View ArticleSecurity Professionals Give Global Cybersecurity a “C” Grade
In a new survey conducted by Tenable in partnership with research firm CyberEdge Group, 504 information security practitioners worldwide were asked a series of questions to calculate their overall...
View ArticleDrifting Out of Compliance? You’re Not Alone
This is the first installment in a “Drifting Out Of Compliance” series where I take a closer look at organizational approaches to compliance, the resulting challenges that impact organizations’ ability...
View ArticleCreating Meaningful Metrics
In today’s information security departments, no matter what the maturity level, metrics are almost always a deliverable required by upper management to gauge the security posture of the company as well...
View ArticleAnswering Your Questions about Nessus Cloud
I was fortunate to attend several Tenable User Group meetings in the Northeast a few weeks ago. One of the topics we discussed at the meetings was Nessus® Cloud – what it is, what it does, and how it...
View ArticleEstablishing Relevant Security Metrics, Part 1: What is a Metric?
Marcus Ranum, a Senior Strategist at Tenable, is a sought-after spokesperson on security metrics. Over the next two weeks, Marcus will share some of his insights in a 5-part video blog series,...
View Article3 Myths That Impede the Shift Towards Continuous Compliance
Drifting Out of Compliance, Part 2 This is the second installment in my Drifting Out of Compliance series, taking a closer look at organizational approaches to compliance and the challenges of shifting...
View ArticleMore Understanding PCI DSS Scanning Requirements
Yes, Virginia There Are Internal Network Scanning Requirements for PCIRecently, Tenable published a blog, Understanding PCI DSS Scanning Requirements, which provided an overview of the three distinct...
View ArticleSecurity Issues that Deserve a Logo, Part 1: Glimpse
Since April 2014, a new trend in security has experienced a meteoric rise, with headlines grabbed in both mainstream media and the tech press. Vulnerabilities, once the preserve of the researcher and...
View ArticleGrading Cybersecurity Around the Globe
Tenable has released its inaugural Global Cybersecurity Assurance Report Card, with research conducted by the CyberEdge Group. The report takes the responses of over five hundred security professionals...
View ArticleEstablishing Relevant Security Metrics, Part 2: Why Keep Security Metrics?
If “the language of security is metrics,” then establishing a sound security metrics program is a necessity. But why should you track metrics? It’s not just about justifying your security team’s work...
View ArticleTenable Announces Free On-Demand Training
At Tenable, our goal is to help our customers truly secure their IT infrastructure and help them make the most of their investments. Today, we are excited to announce the availability of free on-demand...
View ArticleCIS Updates the 20 Critical Security Controls
The Center for Internet Security (CIS) has come forward with their most recent set of information security controls. The previous edition of the Critical Security Controls listed 20 controls for an...
View Article“Continuous” Now Part of the Standard of Due Care
Drifting Out of Compliance, Part 3This is the third installment in my Drifting Out of Compliance series, taking a closer look at organizational approaches indicative of a point-in-time compliance...
View ArticleEstablishing Relevant Security Metrics, Part 3: What are the Top Security...
In Part 3 of Marcus Ranum’s video series on security metrics, he talks about the most important security metrics that you should track. What are the top 10 security metrics? Marcus’ answer may surprise...
View ArticleThe Security Model is Broken, Part 6: How To Fix It
Over the past several months, I have been writing about how our security model is broken. This blog is the final in this series, and it focuses on four crucial root causes that must be addressed if we...
View ArticleEstablishing Relevant Security Metrics, Part 4: How to Establish Security...
In this episode of Marcus’ video series on security metrics, he provides advice on starting a metrics program. Should you go bottom up with data, or top down from processes? Find out which approach...
View Article