by Joanne Rasch on September 15, 2014
Tenable Network Security CEO Ron Gula got the opportunity to sit down with IT Harvest’s Richard Stiennon while they were at Black Hat USA 2014. Stiennon is the Chief Research Analyst and founder of the industry analyst firm IT-Harvest.
by Paul Asadoorian on September 15, 2014
by Aarij Khan on September 12, 2014
Data breaches associated with “insiders” – individuals considered trusted entities and granted privileged access to internal systems and data – are not the most common type of IT breach, but are one of the most costly with an estimated cost of over $400,000 per incide
by Dick Bussiere on September 2, 2014
Today, Tenable Network Security’s Research team announced the release of the latest SecurityCenter Continuous View (SC CV) dashboard to address the Australian Signals Directorate’s (ASD) updated security publication, “Strategies to Mitigate Targeted Cyber Intrusions.”
by Paul Asadoorian on August 29, 2014
One of the inherent qualities of malware is the ability to hide from the system and the user. It is in the best interest of the bad guys to not be detected, and various forms of malware implement different methods of hiding. However, one method that is very scary is the ability to hide inside the components of the PC, rather than in the operating system. This is the case with malware targeting the BIOS or the unified extensible firmware interface (UEFI) in more modern computers. The dangers is that software running in this area of the system can gain full control of any functions (such as all connected hardware) and bypass protections put in place by the operating system. It makes detection extremely difficult and will persist across system restores and rebuilds.
by Ken Bechtel on August 28, 2014
On July 31, US-CERT released a report on a Point of Sale (POS) targeting malware called BackOff. In the last week, we’ve seen news coverage of multiple highly recognizable corporations being compromised by this threat.
by Ron Gula on August 26, 2014
Privileged users are a fact of life, but they pose an expanding opportunity to adversaries in the new IT landscape. There are two classes of privileged users on your network today: the users of your cloud-based applications such as SalesForce and NetSuite, and your system administrators.
by Sherry Quinn on August 22, 2014
Splunk Enterprise analyzes everything from customer clickstreams and transactions to network activity and call records, turning your machine data into valuable insights. The Tenable™ PVS app for Splunk increases the security threat intelligence of Splunk by sending it critical security-relevant information.
by Aarij Khan on August 12, 2014
Tenable delivers update to SecurityCenter CV’s Log Correlation Engine, making it easier to integrate Continuous Monitoring in your IT infrastructure.
by Aarij Khan on August 7, 2014
Tenable’s SecurityCenter Continuous View makes it easy for companies to detect the use of cloud services and identify data stored in the cloud