The Buck Stops There: NIST SP 800-171
The U.S. government is ultimately responsible for preventing unauthorized access and disclosure of its non-public information. However, it will soon require its service providers to put adequate...
View ArticleSecurityCenter: Leveraging Vulnerability Data Collection for Incident Response
Prioritizing threat management and vulnerability remediation may be seen as a roadblock to effective incident response (IR) preparation, but in reality the efforts assist each other quite well....
View ArticleForbes Names Tenable as One of the Next Billion-Dollar Startups for 2016
This week, Forbes released its second annual list of billion-dollar startups. Tenable is proud to be included in this prestigious list of 25 up and coming companies for 2016.2016 seems to be the year...
View ArticleDo You Know Where Your UPnP Is?
Much has been said about the security of Universal Plugin and Play (UPnP) over the years. There have been FBIwarnings, security researchers havepublishedpapers, and even Forbes has told us to disable...
View ArticleMr. Robot and Your Crown Jewels
Through Season 2 of Mr. Robot, we saw the aftermath of the 5/9 hacks and gained more of an understanding of what roles each character plays in the attack. While last season focused on gaining initial...
View ArticleExpanding Vulnerability Management to Container Security: FlawCheck Joins...
Today marked a significant milestone, as Tenable Network Security announced the acquisition of FlawCheck, a company that Sasan Padidar and I founded in early 2015. We built FlawCheck to address the...
View ArticleTop Oil and Gas Cybersecurity Threats Driving the Need for Vulnerability...
We hear the headlines every day: “cyberattacks continue to grow each year in number and sophistication.” We also often hear that the costs of detecting and defending against cyberattacks continue to...
View ArticleGhosts of InfoSec
*/As National Cybersecurity Awareness Month draws to a close on Halloween, it is a fitting time to reflect on some of the ghosts of infosec.Friendly and unfriendly ghostsThe ghosts of infosec include...
View ArticleModernizing Government Technology
Recently Jack Huffard guest blogged for The Northern Virginia Technology Council (NVTC), the largest technology council in the United States. InModernizing Government Technology, Jack discusses the...
View ArticleTenable SecurityCenter and McAfee ePolicy Orchestrator Integration
McAfee ePolicy Orchestrator (ePO) is security management software for enterprise systems, providing agent-based accounting of managed networked assets. With automated policy management, you can...
View ArticleSecuring an Expanding Cloud Infrastructure
Although cloud infrastructure is being implemented by many organizations, there still seems to be a degree of skepticism regarding its security. According to a survey conducted by SANS, 40% of...
View ArticleGovernment and Industry Collaboration: The Long Path to Trust and Sharing
Agencies are stepping up to the plate and contributing active intelligence to threat sharing programs, a big step on the long and challenging path to effective cybersecurity information sharing.Both...
View ArticleTime Crunch: Federal Contractors Scramble to Clear NISPOM Change 2
Upon winning a government contract, many corporate executives breathe a sigh of relief. But these sighs may now be replaced by moans of frustration upon realizing what it takes to remain compliant with...
View ArticleContainerization and Security
Containerization is not only an exciting foundation of DevOps; it is also an answer to several critical operational issues.For developers, building software once, packaging it and running it anywhere...
View ArticleVulnerability Prioritization with Nessus Cloud
If you’re a security professional, vulnerability prioritization is likely something you deal with frequently. Few, if any organizations ever address 100% of discovered vulnerabilities, as new...
View ArticleActively Monitoring a Mobile Workforce with SecurityCenter
As the boundaries of the traditional workplace expand from users in the traditional single office building to mobile road warriors and remote workers, the effectiveness of a vulnerability management...
View ArticleGlobal Cybersecurity Confidence Declines
The newly released 2017 Tenable Network Security Global Cybersecurity Assurance Report Card, with research conducted by CyberEdge Group, updates findings from the 2016 Global Cybersecurity Assurance...
View ArticleTop 3 Cybersecurity Challenges Facing the Finance Sector in 2017
The finance sector is no stranger to adversity. Financial service organizations have been beleaguered by recessions, lackluster stock prices, unprecedented competition, tough new regulations, and...
View ArticleImproved SCADA Visibility and Reporting with PVS 5.2
At Tenable, our goal is to provide solutions that enable our customers to secure their organizations and improve visibility into their security posture. As part of this commitment, we are pleased to...
View ArticleClearing a Path to the Cloud for Government Agencies
The U.S. government is committed to cloud computing and steps are being taken by Congress to make the necessary funding available. But there are practical challenges that remain in creating a clear...
View Article