Tenable Blog

Detecting Shellshock with LCE Process Accounting

A critical vulnerability in bash (Bourne Again SHell) versions through 4.3, the default shell for many Linux and other Unix distributions (including Mac OS X), presents a critical security concern for network-attached devices that use bash, especially those with an at

The Current State of PCI

The Payment Card Industry has been shaken recently by numerous breaches that have successfully exploited malware on Point-of Sale (POS) systems to steal payment card data at retailers of all sizes around the country.

On the Security of “Things”

The security ramifications of the "Internet of Things" (IoT) is a hot topic lately. That’s not to say the security community has not been aware of this problem; and dealing with it for some time (or ignoring it as the case may be).

Should Your Board of Directors be Managing Your Security?

Should your board of directors be managing your security?

This is not a rhetorical question. Ensuring a good security posture requires that your board of directors and senior management are on board and support your efforts at securing corporate data.

Let’s pose a few questions:

IT-Harvest Interviews Ron Gula

Tenable Network Security CEO Ron Gula got the opportunity to sit down with IT Harvest’s Richard Stiennon while they were at Black Hat USA 2014. Stiennon is the Chief Research Analyst and founder of the industry analyst firm IT-Harvest.