by Ron Gula on August 26, 2014
Privileged users are a fact of life, but they pose an expanding opportunity to adversaries in the new IT landscape. There are two classes of privileged users on your network today: the users of your cloud-based applications such as SalesForce and NetSuite, and your system administrators.
by Sherry Quinn on August 22, 2014
Splunk Enterprise analyzes everything from customer clickstreams and transactions to network activity and call records, turning your machine data into valuable insights. The Tenable™ PVS app for Splunk increases the security threat intelligence of Splunk by sending it critical security-relevant information.
by Aarij Khan on August 12, 2014
Tenable delivers update to SecurityCenter CV’s Log Correlation Engine, making it easier to integrate Continuous Monitoring in your IT infrastructure.
by Aarij Khan on August 7, 2014
Tenable’s SecurityCenter Continuous View makes it easy for companies to detect the use of cloud services and identify data stored in the cloud
by Marcus J. Ranum on August 6, 2014
The landscape of IT security is changing and the rash of recent data breaches has targeted a fatal flaw in the way organizations have approached security over the last two decades.
by Ron Gula on August 5, 2014
Last week I had my annual physical, with the goal of checking the big things—heart, cholesterol, blood pressure. I also had an ache in my foot that had caused me some trouble running, but which I had largely ignored. My doctor recommended a foot x-ray.
by Manish Patel on July 30, 2014
Nessus and SecurityCenter now integrate with the Dell KACE K1000 Systems Management appliances to identify missing patches on vulnerable systems, detect unmanaged systems, and extend scanning to cover systems that previously could not be scanned.
by Manish Patel on July 21, 2014
Organizations have adopted mobile devices as essential part of their business and rely on MDM solutions like AirWatch to track and manage them as well as certain applications that run on them.
by Manish Patel on July 15, 2014
Amazon Web Services (AWS) allows organizations to shift key compute, storage, and network resources from on-premise to the cloud, offering an on-demand delivery of IT resources with pay-as-you-go pricing. While organizations have deployed vulnerability and security solutions to protect their on