by Manish Patel on September 30, 2014
With Tenable’s Nessus, security and compliance teams can audit and inventory devices and software to identify what is malicious, abnormal or out-of-compliance. However, do you ever need to pinpoint the offending system or software to its user?
by Gavin Millard on September 25, 2014
As many of you know, a major vulnerability was discovered yesterday.
by Rich Walchuck on September 25, 2014
A critical vulnerability in bash (Bourne Again SHell) versions through 4.3, the default shell for many Linux and other Unix distributions (including Mac OS X), presents a critical security concern for network-attached devices that use bash, especially those with an at
by Marcus J. Ranum on September 19, 2014
In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs.
by Jack Daniel on September 15, 2014
Financial services organizations are some of the most highly protected institutions in the nation, but, at the same time, are under constant attack. As a result, financial institutions have to be prepared to handle any security disaster.
by Paul Asadoorian on September 15, 2014
The security ramifications of the "Internet of Things" (IoT) is a hot topic lately. That’s not to say the security community has not been aware of this problem; and dealing with it for some time (or ignoring it as the case may be).
by Craig Shumard on September 15, 2014
Should your board of directors be managing your security?
This is not a rhetorical question. Ensuring a good security posture requires that your board of directors and senior management are on board and support your efforts at securing corporate data.
Let’s pose a few questions: