Cody Dumont is a Software Engineering Manager at Tenable, creating innovative solutions to business and security problems. Cody specializes in creating dashboards,reports and ARCs for Tenable.io and Tenable.sc, addressing critical compliance issues, current vulnerabilities, and network asset discovery. With Cody's background in network architecture and design, and security solution engineering, he understands customer pain points and their technology needs. Cody is a Certified Information Systems Security Professional, GIAC Certified Incident Handler, Cisco Certified Network Security Professional, GIAC Exploit Researcher and Advanced Penetration Tester, and a GIAC Certified Forensic Analyst.
Maintaining a set of generally accepted best practices in the cybersecurity industry is quite challenging. The CIS is an organization that works with security experts to develop a set of 'best practice' security standards designed to harden operating systems and applications. These report templates provides a high-level overview of results gathered from CIS compliance scans using the CIS CentOS and Alma Linux Benchmarks.
Everyone is always talking about metrics. Just like the 1970’s TV show that quipped, “Marcia, Marcia, Marcia,” analysts today are stressing Metrics, Metrics, Metrics. But what security metrics are important and how can we identify the best metrics from the not so useful metrics?
To protect the citizens of Canada, the Canadian Government has analyzed trends in cyber threat activity that impacts government Internet-connected networks. The result of the study is ITSB-89 revision 3, Top 10 Security Actions. This report provides executive-level content that demonstrates how SecurityCenter Continuous View (CV) can help Canadian organizations comply with regulations and best practices.
To protect the citizens of Canada, the Canadian Government has analyzed trends in cyber threat activity that impacts government Internet-connected networks. The result of the study is ITSB-89 revision 3, Top 10 Security Actions. This dashboard provides executive level content that demonstrates how Tenable.sc Continuous View (CV) can help Canadian organizations comply with regulations and best practices.
With the ever-expanding need for encryption and the complexity PKI brings to the table, tracking certificate expiry dates becomes more challenging. Tenable.sc can monitor certificate usage and expiration dates using active and passive detection through log correlation. This dashboard provides a concise view of systems and the expiration date of any identified certificates.
In today’s ever-evolving technology market, companies are merging and gaining the benefits of acquisition, but also taking on new risks as a result. Dell and EMC recently merged and now have a much more diverse offering to customers, but how does this impact risk? This report uses CPE filters to identify vulnerabilities related to software and hardware made by Dell Technologies.
Organizations rely on robust authentication to protect critical systems and data; however, weak passwords, poor authentication practices, and vulnerable authentication mechanisms can put an organization at risk. This dashboard aligns with Section IV of the ANSSI 40 Essential Measures for a Healthy Network: Authenticate the User. Using this dashboard, an organization will be able to obtain information about user accounts and groups, account and password vulnerabilities, and authentication compliance issues.
The federal government relies heavily on external service providers and contractors to assist in carrying out a wide range of federal missions. In order to protect information processed by, stored on, or transmitted through nonfederal information systems, NIST SP 800-171 provides recommended requirements, including the Configuration Management family of requirements. This dashboard focuses on establishing and maintaining inventories and the secure baseline configurations of information systems.
The task of safeguarding a network in today's world is a formidable one. This report aligns with the ANSSI 40 Essential Measures for a Healthy Network and provides information to assist in achieving and maintaining compliance with the measures. An organization can use the information presented in this report to better secure and monitor the network, enabling better defenses against attacks and responses to malicious activity, and ultimately safeguarding the organization's critical assets, data, and overall reputation.
In the Mr. Robot Season 2 finale, we finally learn about phase 2 of the hack. Spoiler Alert: The hack is to overwrite firmware and cause a battery room in a data center to explode.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Tenable Vulnerability Management
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Buy Tenable Web App Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Buy Tenable Lumin
Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank You
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable Security Center
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable OT Security
Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.
Request a demo of Tenable Identity Exposure
Continuously detect and respond to Active Directory attacks. No agents. No
privileges.
On-prem and in the cloud.
Request a Demo of Tenable Cloud Security
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
See Tenable One In Action
Exposure management for the modern attack surface.
See Tenable Attack Surface Management In Action
Know the exposure of every asset on any platform.
Thank You
Thank you for your interest in Tenable Attack Surface Management. A representative will be in touch soon.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
NEW - Tenable Nessus Expert Now Available
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro Trial.
Buy Tenable Nessus Professional
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.
Thank you.
You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].