NIST Cybersecurity Framework Adopted by Thirty Percent of US Organizations
In the February 18, 2016 Risky Business podcast, Cris Thomas speaks with Patrick Gray about the NIST Cybersecurity Framework.Gartner recently announced that 30% of all US organizations - both public...
View ArticleCloud Security: Hybrid Environments
We recently asked our security experts about the top security challenges facing cloud computing today. Most cloud security issues are no different than the security problems in applications that are...
View ArticlePayment Paradox: The True Cost of Payment Data Breaches
It’s natural to assume the most direct impact of a cyberattack within the financial payment system is the stolen data or funds. In reality, the true impact extends to the loss of consumer confidence...
View ArticleWeakness, What Weakness? Find the Root Cause
I suspect most security practitioners think of weaknesses as primarily being vulnerabilities and misconfigurations. That is understandable because removing vulnerabilities and misconfigurations is an...
View ArticleGhost in the Machine: “MouseJack” Wireless Mouse and Keyboard Injection...
It was over 6 years ago that the wireless keyboard sniffer project known as “Keykeriki” was first demonstrated. The sniffer allowed someone to eavesdrop on what is being typed as each key was pressed...
View ArticleFocus on the Government
As pressure grows on the federal government to strengthen cybersecurity in the wake of the OPM attacks, agencies are challenged to find and deploy the best, most efficient security programs to protect...
View ArticleState and Local Government Grapples with Legacy IT
With many states relying on IT systems that are 20 years old or more, government agencies are challenged to secure legacy technology that is no longer supported and often hidden from view.For the...
View ArticleAmazon CloudTrail Monitoring with SecurityCenter Continuous View
Amazon Web Services (AWS) has become a critical Infrastructure as a Service (IaaS) platform for many companies. Just as cloud environments provide advantages of scalability, elasticity, and...
View ArticleTransforming Security from Defense in Depth to Comprehensive Security Assurance
Over the past 20 years, we have seen steady growth in the development and marketing of security solutions. But despite the fact that organizations are investing in sophisticated security, major...
View ArticleBring Unknown Assets and Shadow IT into the Light
“Know yourself” is millennia-old advice, yet today’s IT environments almost always violate this principle. With the widespread popularity of mobile devices, cloud services, and virtualized...
View ArticleTenable Automates NIST Cybersecurity Framework Technical Controls
At RSA this week, Tenable is announcing a new capability in SecurityCenter Continuous View™ that automates and simplifies adoption of the NIST Cybersecurity Framework.Adoption of the NIST Framework for...
View ArticleHave You Been Compromised? Let’s Go Hunting!
Protecting your network against attackers is only part of the equation. You have probably seen the statistics. Research tells us that attackers spend an average of 200 days inside a network before...
View ArticleKey Takeaways from RSA 2016
The annual RSA Conferences are the best way to learn about the latest trends and technologies in information security. This year’s RSA USA conference took place in San Francisco February 29 – March 4,...
View ArticleNew Scan Policies, Plugins and Dashboard for CVE-2016-0800: DROWN
No matter which product you have, Nessus®, SecurityCenter™, SecurityCenter CV™, or Passive Vulnerability Scanner™, Tenable can determine if you are at risk of “drowning.”The DROWN CVE-2016-0800...
View ArticleRSA Conference 2016 Wrap-up
This year marked the twenty-fifth anniversary of the RSA USA Conference. Personally, this marked my eighth RSA in seventeen years. Now held in the Moscone Center in San Francisco, things have come a...
View ArticleData Breach 101: Cyber Security Issues in Higher Education
Higher education provides a treasure chest of high value in formation for cyberattackers. With everything from Social Security numbers and medical records to financial data and intellectual property...
View ArticleLeveraging NIST Standards to Build Your Enterprise Security
The federal government has produced a body of standards and guidelines—including the NIST Cybersecurity Framework—that can help the private sector as well as government agencies improve information...
View ArticleEvaluating Mobile Security in a Mobile World
Mobile Device Security Has Industry Professionals WorriedIn November 2015, Tenable released the inaugural Global Cybersecurity Assurance Report Card, with research conducted by CyberEdge Group. The...
View ArticleNIST Cybersecurity Framework Adoption on the Rise
Security is top of mind for every organization, and in today’s complex IT environment, it can be a challenge for CISOs to ensure their security programs are performing efficiently and effectively. Over...
View ArticleYou Can’t Defend IT Hidden in the Shadows
You can’t secure and protect devices or data you aren’t even aware of. It’s a simple premise, but one that has become more and more relevant in recent years. It’s challenging enough to just keep up...
View Article