BYOD and Mobile Security: 2016 Spotlight Report Results
Tenable recently sponsored a survey on BYOD (bring your own device) and mobile security run by our friends at the LinkedIn Information Security Community. Given that mobile comes up frequently when we...
View ArticleTailoring the NIST Cybersecurity Framework for a Precise Fit
I recently had the privilege to attend the National Institute of Standards and Technology (NIST) Cybersecurity Workshop 2016, held at the NIST headquarters in Gaithersburg, Maryland on April 6-7, 2016....
View ArticleNew in Nessus 6.6
Cloud Workflow Updates, Platform Support, Configuration Audits We are pleased to announce the release of Nessus 6.6. We are excited about the new and updated capabilities being delivered. Here are some...
View ArticleAuditing Docker with Nessus 6.6
“It worked in Dev, it works in Dev. Don’t know why it’s not working in production. It’s an Ops problem now.”Many of us have lived through a failed production deployment of an application at least once....
View ArticleBadlock or Sadlock?
New Scan Policies, Plugins and Dashboard for CVE-2016-2118 & CVE-2016-0128No matter which name you prefer, Badlock or Sadlock, for the recently disclosed CVE-2016-2118 (SAMR and LSA...
View ArticleAuditing OpenStack with Nessus 6.6
Public cloud, private cloud or hybrid cloud—regardless of which cloud-computing model you choose, there is a good chance a part of it is already powered by an open source solution. And when it comes to...
View ArticleAligning IT with Government Agency Missions to Reduce Shadow IT
Lack of communication between IT departments and those responsible for executing agency mission can lead to the creation of shadow IT—unauthorized and often unmanaged applications that can introduce...
View ArticleCybersecurity Implications of IoT Innovation with the Healthcare Industry
The Internet of Things has the potential to revolutionize the world, including healthcare. But doctors, hospitals and medical experts might want to pause before adopting this technology and evaluate...
View ArticleTop Three Reasons to Manage Shadow IT
Top Three Reasons to Manage Shadow ITWe’ve shared a few blog articles in recent months about shadow IT - what it is and how to manage it. We’ve also had many interesting conversations with customers...
View ArticleVerizon’s 2016 DBIR Report
Understand the Threats, Prepare Your Defenses, and Take ActionThe Verizon 2016 Data Breach Investigation Report (DBIR), published earlier this week, includes key insights on real-world data breaches...
View ArticleThe Payment Card Industry Data Security Standard: What’s new in v3.2?
As announced in December 2015, the PCI Security Standards Council released version 3.2 of the Payment Card Industry Data Security Standard (PCI DSS) on April 28, 2016. This version update was necessary...
View ArticleFinding Threats on Your Network: Hunt or Be Hunted
Is your network secure right now? Have any of your PCs or mobile devices been compromised? Before you even attempt to answer these questions, you need to pause and ask yourself: Can you actually answer...
View ArticleNessus Receives CIS Certification for Amazon AWS Foundations Benchmark
Tenable Nessus v6.6 has received certification from the Center for Internet Security (CIS) for the Amazon AWS Foundations benchmark; the first and only CIS member to receive that certification.Tenable...
View ArticleVulnerability Management Priorities Shifting Focus in APAC
Tenable recently commissioned Forrester Consulting to conduct the April 2016 study, Vulnerability Management Trends In APAC: Managing Risk In The Age Of The Customer, to examine how organizations in...
View ArticleThreat Hunting 101: Taming Your Data
Security teams around the world are struggling to keep up with the rapidly changing threat environment, while facing the pressure of being responsible for any malicious activity that happens on their...
View ArticleStreamline Your Remediation-to-Resolution with ServiceNow Integration
Over 20,000 companies and government agencies worldwide use Tenable to identify vulnerabilities in and reduce risk to their network. With nearly 80,000 plugins—the broadest coverage in the industry—our...
View ArticleMaking CDM Work for You with Threat Hunting
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help...
View ArticleThe Verizon 2016 DBIR: Go from Reading to Responding
A few weeks ago, in the Verizon’s 2016 DBIR Report: Understand the Threats, Prepare Your Defenses, and Take Action blog, I shared a quick synopsis of some of the key highlights from the Verizon 2016...
View ArticleAre You Ready to Go Hunting for Threats?
If you lived in a climate with lots of mosquitos, gnats, and crawly things, your house could easily be overrun with pests. Where would you start to get rid of them? You could buy a fly swatter and...
View ArticleCybersecurity Risks of New Tech Could Cost the Energy Sector More than Dollars
Few industries have more to lose from a cybersecurity attack than the energy sector. While an attack in finance or retail can cost an organization millions of dollars, a targeted attack in the energy...
View Article