Data Leakage & File Sharing

MAS TRM Guidelines

by David Schwalenberg
July 2, 2014

The Monetary Authority of Singapore (MAS) published new Technology Risk Management (TRM) Guidelines in June 2013. The MAS TRM Guidelines dashboard provides a high level overview of information relevant to specific sections in the TRM Guidelines.

Daily Usage Summary

by Michael Willison
June 27, 2014

Daily Usage Summary Dashboard screenshot
The Daily Usage Summary dashboard collects and displays daily information that the IT Security team should review frequently during the workday. These components are helpful in monitoring activity within the corporate network.

SEC Risk Alert

by David Schwalenberg
June 11, 2014

SEC Risk Alert Dashboard Screenshot
On April 15, 2014, the U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert describing its Cybersecurity Initiative "to assess cybersecurity preparedness in the securities industry." This dashboard presents network information that can assist organizations in evaluating and improving their cybersecurity preparedness.

Web Activity

by David Schwalenberg
May 14, 2014

Web Activity Dashboard Screenshot
This dashboard presents web activity detected in the last 72 hours, with some 7-day trending. This dashboard can be used to monitor web accesses and look for suspicious or potentially unauthorized activity.

Passive Network Forensics

by David Schwalenberg
April 30, 2014

Passive Network Forensics Dashboard Screenshot
This dashboard presents information passively detected over the last 72 hours, such as summaries of domains accessed and indicators of suspicious network activity. This information can be helpful for network monitoring and forensics.

HeartBleed Dashboard

by Cody Dumont
April 10, 2014

HeartBleed Dashboard Screenshot
This dashboard reports on the newly identified HeartBleed vulnerability. Using all the tools available to SecurityCenter users, Tenable has several methods of identifying vulnerable systems.

Council on CyberSecurity 20 Critical Security Controls Dashboard

by Cody Dumont
March 14, 2014

CSC Top 20 Dashboard
This dashboard displays many indicators of the Council on CyberSecurity 20 Critical Security Controls. As published by Council on CyberSecurity, the goal of the 20 Critical Security Controls is to protect assets, infrastructure, and information by strengthening your organization’s defensive posture through continuous automated protection and monitoring. This SecurityCenter Dashboard is comprised of one dashboard with 15 individual components that provide insight to nearly 50 items that directly correlate to the Council on CyberSecurity 20 Critical Security Controls.

PVS Detections

by David Schwalenberg
February 12, 2014

PVS Detections Dashboard Screenshot
This dashboard highlights network vulnerabilities and promotes network awareness by displaying indications of the network traffic detected by the Passive Vulnerability Scanner (PVS).

Copyright Indicator

by Josef Weiss
November 14, 2013

Copyright Indicator Component

This component presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files, that are being shared without the owner's permission. If any of these files actually contain copyrighted material, and if they are freely swapped around, your organization might be held liable for copyright infringement by associations such as the RIAA or the MPAA.

The associated report can be found here: Copyright Report