Comprehensive Vulnerability Management for a Changing IT Landscape
A comprehensive vulnerability management program is the foundation for effective security. Yet, many organizations find it challenging to run an effective program where vulnerabilities are quickly...
View ArticleFTC and FCC Inquiry about Mobile Device Security
Earlier this month, the US Federal Communications Commission (FCC) and the Federal Trade Commission (FTC) launched parallel inquiries into mobile carriers and device manufacturers about their processes...
View ArticleThreat Hunting 201: Quick Wins with DNS
In all practicality, threat hunting is hard. Either you don’t have data you need, or you have too much data with little or no resources to work with it. However, DNS is one of the best indicators for a...
View ArticleTenable Blog Available on Email Subscription
The Tenable Blog now offers a free email subscription. The email subscription delivers notifications of new blogs every day or once a week, right into your inbox; no need to use an RSS reader to see...
View ArticleProof Point for the Importance of Continuous Monitoring
Recent events in Malaysia have shown once again that continuous monitoring should be a key component in any cybersecurity program.Malaysia’s myIMMs immigration system was recently discovered to have...
View ArticleCISOs Play an Important Role in Procuring Cyber Insurance Coverage
On May 24, 2016 Tenable hosted a panel webinar about Five Things Every CISO Must Understand about Cyber Insurance Coverage. Our panel of experts included:Ben Beeson: Senior Vice President, Lockton...
View ArticleThreat Hunting 202: Practical Whitelisting
In my last blog, I talked about DNS and its importance as an indicator of malicious activity. Once you’re past the quick wins stage, what’s the next step? Most of the difficulty with threat hunting is...
View ArticleSingapore Unplugs
In an unusual risk reduction effort, Singapore has decided to remove internet access from all civil service desktops, impacting over 100,000 computers. This move is to be fully implemented by May 2017....
View ArticleReduce Exposure Through Immediate Threat Identification and Fast Response
At Tenable, we have long been champions of continuous monitoring. Constantly collecting and interpreting data from multiple sources, including active and agent scans, network traffic, events, log data,...
View ArticleKey Takeaways from the Infosecurity Europe Conference
There is no better way to learn about information security in Europe than by attending the Infosecurity Europe Conference (Infosec 2016). This year’s London-based conference took place 7-9 June 2016,...
View ArticleMeasuring Security Assurance: The Right Tools to Achieve Success
Imagine you’re standing on the beach with your boss. He hands you a ruler and tells you it’s your job to measure the ocean and make sure that it stays within acceptable parameters for “ocean safety.”...
View ArticlePortland Uses the Cybersecurity Framework and Critical Security Controls
Aligns Business Risk and SecurityAccording to the Trends in Security Framework Adoption Survey, conducted by Dimensional Research on behalf of Tenable, 44% of organizations use more than one security...
View ArticleSecurity Metrics Must Tell a Story That is Relevant to Your Business
Using Security Metrics to Drive ActionTenable recently sponsored the publication of an ebook, Using Security Metrics to Drive Action. This ebook is a compilation of thoughtful essays from 33 CISOs and...
View ArticleSimplifying Credentialed Vulnerability Assessments - Tenable and Thycotic
Credentialed vulnerability assessments deliver the deepest analysis of targeted assets, networks and systems, providing highly detailed results. Without this access, unauthenticated assessments only...
View ArticleTenable Supports ISO/IEC 27001/27002 and CIS Critical Security Controls
According to the Trends in Security Framework Adoption Survey, research conducted by Dimensional Research on behalf of Tenable, adoption of security frameworks is at an all-time high. Your organization...
View ArticleGood Security Metrics are a Work in Progress
Using Security Metrics to Drive ActionTenable recently sponsored the publication of an ebook, Using Security Metrics to Drive Action. This ebook is a compilation of thoughtful essays from 33 CISOs and...
View ArticleBeyond the Numbers: Adding Strategic Business Context to Metrics
CISOs too often focus on numbers and metrics that are disconnected from the strategic mission of the business. Cybersecurity can add value, however, by looking past the numbers to the steps being taken...
View ArticleVulnerability Management in Government: Visibility Plus Context
Vulnerability management is an essential part of government cybersecurity. It requires not only continuous monitoring and visibility to spot vulnerabilities, but also the context needed to prioritize...
View ArticleSecurity in the Digital Age
The Gartner Security and Risk Management SummitWhen Gartner Vice President Peter Firstbrook took the stage at this year’s Gartner Security and Risk Management Summit, he spoke of two shifts in...
View ArticleWith Security Metrics, Every Picture Tells a Story
Using Security Metrics to Drive ActionTenable recently sponsored the publication of an ebook, Using Security Metrics to Drive Action. This ebook is a compilation of thoughtful essays from 33 CISOs and...
View Article