Blog

Security Metrics - Why Should You Care?

by Marcus J. Ranum on February 26, 2014

In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs. These metrics can create better understanding and awareness about the success of their approaches, as well as allow them to build support for programs and funding requests. Most of the complex fields humans engage in develop their own terminology, which then becomes a problem of translation for the expert. One of the fundamental problems for security at the “C-level” is to translate between security's inner language, which tends to be about risk...

What’s the Current State of IT Security in the Financial Services Sector? SANS Goes to the Source for the Answer...

by David Schreiber on February 24, 2014

When it comes to keeping up with advances in cybercrime, how is the financial services sector fairing? What impact are evolving regulations, industry standards, cloud services, BYOD, big data and escalating global cyber-threats having on the infosec practices and people tasked with keeping the sector secure? To get some perspective on the current state of IT security among financial services firms, the SANS Institute completed a detailed industry-specific survey in early February 2014. Tenable co-sponsored the research project, which gathered results from over 400 respondents. SANS analysts G...

The Move Beyond Point Scanning

by Paul Crutchfield on February 20, 2014

A few weeks back, I was visiting with a customer to update them on current release information and roadmap features. A lot of the discussion revolved around their current vulnerability management process, and potential improvement areas based on SecurityCenter Continuous View . We talked about how many people they had using SecurityCenter and how they utilized the analytics and dashboards, but it turned out there were only a handful doing this, and they were mainly using SC to automate their weekly scanning, report creation, and distribution process. This is not uncommon, and SC can certainly...

ThreatConnect: Indicator for Suspicious Behavior and Malware

by Paul Asadoorian on February 19, 2014

Information about threats comes from many different sources. Several third parties, such as ThreatConnect, offer such information which can be used as indicators for suspicious behavior and/or malware in your environment. ThreatConnect technology can be integrated with Tenable's SecurityCenter and Nessus products as follows: IP addresses, file hashes, and URLs can be used as indicators with SecurityCenter. File hashes can be used as part of malware scanning with Nessus. For example, custom file hashes could be exported from ThreatConnect and used in Nessus or SecurityCenter custom malware...

Securing a Happy Valentine’s Day

by Jon Brody on February 14, 2014

People approach security much the same way they do love. Some are romantics. Others are realists. To celebrate Valentine’s Day, here are inspirations by Tenable’s team of security experts.

Introduction and Welcome - Security Metrics

by Marcus J. Ranum on February 13, 2014

In this blog series on SecurityWeek, Tenable CSO Marcus Ranum advises security professionals on how they can create and share metrics in their jobs. These metrics can create better understanding and awareness about the success of their approaches, as well as allow them to build support for programs and funding requests. This is the beginning of a series of postings I'll be doing on security metrics. It's a topic that I don't think we, as a community, have a particularly good grasp of – probably because security, as a field, is only just beginning to professionalize to the point where (in some...

Detecting Snowden - The Insider Threat

by Paul Asadoorian on February 12, 2014

Tenable's scanning, sniffing, and logging products can comprehensively identify a variety of potentially malicious activity, including activity generated by malicious insiders like Edward Snowden. Tenable's SecurityCenter Continuous View solution can further automate the detection of events coming from scanners, intrusion detection systems, malware, compliance violations, and much more.

Do you have HVAC systems on your internal network?

by Ron Gula on February 10, 2014

If you have not heard the news yet, Brian Krebs has reported that the recent Target breach occurred when hackers broke into the network of a company that managed the company's heating, ventilation and air conditioning (HVAC) systems. The intruders leveraged the trust and network access granted to them by Target and then from these internal systems broke into the point of sale (POS) systems and stole credit and debit card numbers, as well as other personal customer information. We can learn a lot from this incident. In this blog, we will discuss Tenable's approach to identifying HVAC systems,...

Pages