by Mehul Revankar on February 4, 2015
Let’s do a show of hands. How many network administrators go through a security audit without experiencing some anxiety?
I am guessing not many. And I can understand why.
by Craig Shumard on February 3, 2015
by Kelly Prevett on January 27, 2015
A major vulnerability was disclosed today in the GNU C Library (“glibc”).
by Jeffrey Man on January 27, 2015
The Payment Card Industry Data Security Standard (PCI DSS) version 3.0 is now the de facto standard for measuring security programs for all merchants and service providers that participate in commerce using credit or debit cards.
by Jennifer Collis on January 22, 2015
Good cyber hygiene means appropriately protecting and maintaining IT systems and devices and implementing cybersecurity best practices. When good cyber hygiene is built upon a continuous network monitoring platform, you continuously visualize the security posture of your entire IT infrastructure and better protect your organization against advanced cyber attacks.
by Diane Garey on January 20, 2015
This week, Tenable released a maintenance update for the Nessus vulnerability scanner. This update delivers several new features and some minor bug fixes. The new features are described here.
by Stacey Banks on January 16, 2015
The Federal Information Security Management Act (FISMA) of 2002 was put into place to implement a framework for the effectiveness of information security controls for Federal information systems, to provide oversight, and to provide for the development of minimum cont