Blog

Proper Care and Feeding of Antivirus

by Ken Bechtel on May 8, 2014

I started reading comments by people who felt antivirus utilities were a waste of money and not very effective. Then this week, the debate intensified with well-publicized cries that "antivirus is dead." Here, I'd like to address whether or not it is a dead technology. Let's look at what this...

Best Practices for Cybersecurity, Part I: Keeping Bad Guys, Malware Out

by Jeffrey Man on May 7, 2014

Posted originally on Wired, InnovationInsights blog In my last blog, I elaborated upon five “truths / must do’s” for Payment Card Industry (PCI) Data Security Standard (DSS) compliance and cybersecurity protection. But those truths touch upon just some fundamentals. I’ve read numerous articles over...

Infosec Europe 2014

by Gavin Millard on May 6, 2014

As Infosec Europe 2014 drew to a close, our security experts share their thoughts after Europe’s number-one information security event.

The Evolution of an Important Metric: The Poverty Line

by Marcus J. Ranum on May 1, 2014

In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs. These metrics can create better understanding and awareness about the success of their approaches, as well as allow them to build support for programs...

How Vulnerable Are You To The Latest IE 0-Day?

by Paul Asadoorian on April 28, 2014

Tenable customers can use a combination of active scanning, passive scanning and configuration auditing to gauge their level of risk, progress on workaround implementation and track the remediation process once a patch is released. Internet Explorer Zero Day Vulnerability Recently an unpatched...

Five 'Truths' About PCI Compliance and Cybersecurity

by Jeffrey Man on April 28, 2014

Posted originally on Wired, InnovationInsights blog In my last blog, I dispelled three common misconceptions about the Payment Card Industry (PCI) Data Security Standard. And to lend further insight about PCI — especially with regard to its impact upon your cybersecurity assurance — I’d like to...

The Truth Behind Three PCI 'Myths'

by Jeffrey Man on April 22, 2014

Posted originally on Wired, InnovationInsights blog In Part I of this series of posts, I examined how retailers face immense challenges with respect to their cybersecurity posture but don’t often focus on the important elements. For starters, they will spend an inordinate amount of time struggling...

Nessus Amazon AWS Auditing Now Available

by Mehul Revankar on April 22, 2014

Edits and Contributions: Paul Asadoorian The transition to cloud services is well underway, bringing with it traditional and new security challenges. Nessus is evolving to address these challenges. Unlike traditional environments, cloud services require a modified approach to scanning - users can't...

Pages