Tenable Network Security Podcast Episode 192 - "Detecting Malware, Passive...
Welcome to the Tenable Network Security Podcast Episode 192AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Check out our video channel on YouTube which...
View ArticleSpace Rogue from L0pht and Hacker News Network joins Tenable!
I’m very happy to announce that I have recently joined Tenable as a Technical Manager.
View ArticleTenable Launches “Straight Talk About PCI” Discussion Forum
Have you ever tried to navigate the PCI website and gotten lost and confused?Are you part of the 99% of companies that must traverse the PCI Compliance landscape as part of the “Self-Assessment” or...
View ArticleTenable Network Security Podcast Episode 193 - "Tenable Year in Review"
Welcome to the Tenable Network Security Podcast Episode 193AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Check out our video channel on YouTube which...
View ArticleNessus HTML5 UI 2.1 Provides Enhanced Usability
A new update to the Nessus vulnerability scanner user interface, version 2.1, is now available. Nessus UI 2.1 provides enhanced access to scan results, remediations, and detailed information.
View ArticleTenable Network Security Podcast Episode 194 - "Common Sense Security..."
Welcome to the Tenable Network Security Podcast Episode 194AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Check out our video channel on YouTube which...
View ArticleNessus 5.2.5 Is Available for Download
Nessus 5.2.5 is now available for download. This new release fixes the following issues: A possible deadlock occurring under certain conditions at the end of the scan has been correctedReduced the...
View ArticleThe S4 SCADA Security Conference
This year I was asked to come speak at S4, a conference hosted by Digital Bond every January for the past 14 years. I was scheduled to speak on the OTDay, a free day for conference attendees intended to:
View ArticleNessus Compliance Checks for FortiGate Devices
A new compliance plugin allows Nessus users to assess the configuration of FortiGate devices running on the FortiOS operating system.
View ArticleDetecting The Trojan.POSRAM Malware
Malware is created for a number of different purposes and often targeted at a specific industry or type of software. Such is the case for Point-Of-Sale systems, those systems that process transactions...
View ArticleTenable Network Security Podcast Episode 195 - "Critical AND Exploitable"
Welcome to the Tenable Network Security Podcast Episode 195AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Want to ask questions about Nessus, PVS,...
View ArticleSANS 6 Categories of Critical Log Information
New Dashboard – SANS 6 Categories of Critical Log InformationThe SANS Critical Controls are guidelines for strengthening an organization’s security defenses through continuous and automated monitoring....
View ArticleLeveraging Logins and Login Failures to Track Insiders
I recently had the chance to explain Tenable’s approach to tracking insiders through authentication logs to a new employee. The conversation went something like this:Q: If I handed you a pile of logs...
View ArticleTenable Network Security Podcast Episode 196 - "Endpoint Pro"
Welcome to the Tenable Network Security Podcast Episode 196AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Want to ask questions about Nessus, PVS,...
View ArticlePassive Vulnerability Scanner (PVS) 4.0.1 Now Available
PVS 4.0.1 is now available for download.This new release introduces the following features and fixes the following:
View ArticleTenable Network Security Podcast Episode 197 - "Telephony DoS, MediaWiki...
Welcome to the Tenable Network Security Podcast Episode 197AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Want to ask questions about Nessus, PVS,...
View ArticleDo you have HVAC systems on your internal network?
If you have not heard the news yet, Brian Krebs has reported that the recent Target breach occurred when hackers broke into the network of a company that managed the company's heating, ventilation and...
View ArticleDetecting Snowden - The Insider Threat
Tenable's scanning, sniffing, and logging products can comprehensively identify a variety of potentially malicious activity, including activity generated by malicious insiders like Edward Snowden....
View ArticleIntroduction and Welcome - Security Metrics
In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs. These metrics can create better understanding and...
View Article