Tenable Blog

Tenable Blog Greatest Hits Volume 1

Today we launched a new look for our blog with the goal of making it easier for you to find the security content you’re looking for. Our bloggers are recognized as some of the most experienced and well-respected security experts around the world. They include Ron Gula , Renaud Deraison , Marcus...

IT-Harvest Interviews Ron Gula

Tenable Network Security CEO Ron Gula got the opportunity to sit down with IT Harvest’s Richard Stiennon while they were at Black Hat USA 2014. Stiennon is the Chief Research Analyst and founder of the industry analyst firm IT-Harvest. Gula and Stiennon discussed Tenable’s continuous network...

Detecting Hidden Backdoors in Your BIOS With Nessus

One of the inherent qualities of malware is the ability to hide from the system and the user. It is in the best interest of the bad guys to not be detected, and various forms of malware implement different methods of hiding. However, one method that is very scary is the ability to hide inside the components of the PC, rather than in the operating system. This is the case with malware targeting the BIOS or the unified extensible firmware interface (UEFI) in more modern computers. The dangers is that software running in this area of the system can gain full control of any functions (such as all connected hardware) and bypass protections put in place by the operating system. It makes detection extremely difficult and will persist across system restores and rebuilds.

Eyes Wide Shut, or is This a Repeat of the Same Old Thing?

On July 31, US-CERT released a report on a Point of Sale (POS) targeting malware called BackOff. In the last week, we’ve seen news coverage of multiple highly recognizable corporations being compromised by this threat. Some of these new attacks are minor variants of the original threat, which is...

The Weakest Link – Cloud Application Users and Administrators

Privileged users are a fact of life, but they pose an expanding opportunity to adversaries in the new IT landscape. There are two classes of privileged users on your network today: the users of your cloud-based applications such as SalesForce and NetSuite, and your system administrators. Any...

PVS App for Splunk

Splunk Enterprise analyzes everything from customer clickstreams and transactions to network activity and call records, turning your machine data into valuable insights. The Tenable™ PVS app for Splunk increases the security threat intelligence of Splunk by sending it critical security-relevant information.