“Who better to target than the person that already has the ‘keys to the...
In the continuing list of NSA disclosures, it was recently revealed that administrators on target networks were hacked through their Facebook accounts. The leaked NSA document actually stated “Who...
View ArticleTrue White-Knuckled Stories of Metrics in Action: Sylvan
In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs. These metrics can create better understanding and...
View ArticlePVS 4.0.2 is now available for download
This maintenance release addresses the following issues:An expired PVS license or activation code sends the user to the Quick-Setup wizard to allow entry of the new licenseHosts with Internet facing...
View ArticleUnderstanding NIST’s Cybersecurity Framework
NIST’s Cybersecurity Framework (CSF) is likely to become the basis for what's considered commercially reasonable in regards to securing an organization’s infrastructure. For this reason alone companies...
View ArticleBeware of Bleeding Hearts (Updated)
A recently discovered vulnerability, identified as Common Vulnerabilities and Exposures (CVE) CVE-2014-0160, but more commonly called HeartBleed Vulnerability, has been acknowledged by the Open SSL...
View ArticleTenable Facilitates Detection of OpenSSL Vulnerability Using Nessus and...
Facilitate easy detection of the OpenSSL Heartbeat vulnerability in your enterprise
View ArticleCybersecurity Is About Attitude, Culture -- Not Strictly Compliance
Posted originally on Wired, InnovationInsights blog
View ArticleTenable Network Security Podcast - Episode 200
Welcome to the Tenable Network Security Podcast Episode 200AnnouncementsWe're hiring! - Visit the Tenable website for more information about open positions.Want to ask questions about Nessus,...
View ArticleNessus Amazon AWS Auditing Now Available
Edits and Contributions: Paul AsadoorianThe transition to cloud services is well underway, bringing with it traditional and new security challenges. Nessus is evolving to address these challenges....
View ArticleFive 'Truths' About PCI Compliance and Cybersecurity
Posted originally on Wired, InnovationInsights blogIn my last blog, I dispelled three common misconceptions about the Payment Card Industry (PCI) Data Security Standard. And to lend further insight...
View ArticleHow Vulnerable Are You To The Latest IE 0-Day?
Tenable customers can use a combination of active scanning, passive scanning and configuration auditing to gauge their level of risk, progress on workaround implementation and track the remediation...
View ArticleThe Evolution of an Important Metric: The Poverty Line
In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs. These metrics can create better understanding and...
View ArticleInfosec Europe 2014
As Infosec Europe 2014 drew to a close, our security experts share their thoughts after Europe’s number-one information security event.
View ArticleBest Practices for Cybersecurity, Part I: Keeping Bad Guys, Malware Out
Posted originally on Wired, InnovationInsights blog
View ArticleProper Care and Feeding of Antivirus
I began this piece when I was reading generic comments by people who felt antivirus utilities were a waste of money, and not effective. This week, the debate intensified with well-publicized cries that...
View ArticleBest Practices for PCI, Cybersecurity Protection (Part II): Encryption and...
Posted originally on Wired, InnovationInsights blog
View ArticleEstablishing Your Own Metrics: What Not to Do
In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs. These metrics can create better understanding and...
View Article