Whitepapers

Vulnerability Management and Risk Assessment for the Cybersecurity Framework

Tenable Network Security, Inc. serves customers worldwide and each of our customers has a unique set of vulnerability management and compliance requirements. This paper provides insight to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, which calls for “a set of industry standards and best practices to help organizations manage cybersecurity risks”.

Close The Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring

Despite having vulnerability management solutions deployed, organizations continue to be compromised. Tenable Network Security commissioned Forrester Consulting to assess the current state and effectiveness of vulnerability management. The research included an in-depth survey of 180 US-based security leaders from multiple verticals including financial services, government, healthcare, higher education, retail, and utilities/energy.

2014 Cyberthreat Defense Report

In war, knowing your enemy is imperative to establishing an effective defensive strategy. The same holds true for effective IT security, and several excellent industry reports help inform IT security professionals on this front. The annual Data Breach Investigations Report from Verizon, for example, sheds considerable light on the evolving nature of cyberthreats, the actors behind them, and the techniques being used to perpetrate successful attacks.

Tenable Malware Detection: Keeping Up With An Increasingly Sophisticated Threat Environment

With an ever-increasing cyber-threat profile, traditional anti-virus (AV) and anti-malware (AM) products are unable to adequately detect new malware threats facing organizations today. In addition, the rise of the mobile workforce and adoption of BYOD policies introduces another layer of risk with unknown and unmanaged laptops, smartphones and mobile devices accessing sensitive IT resources. These developments leave corporations, government entities and individuals at risk from a wide range of cyber-crime activities.

SANS Inaugural Health Care IT Security Survey – October 2013

For perspective on the current state of health care IT security, the SANS Institute completed a detailed industry-specific survey in September 2013. Based input from 373 respondents representing mostly US-based health care provider organizations, findings were analyzed and published in a report co-sponsored by Tenable Network Security, titled, SANS Inaugural Health Care Security Survey.

Continuous Security for Disruptive IT Networks in Higher Education

Institutions of higher education have a unique combination of security and compliance requirements. Security implementation is especially hard considering the independence of their user community and breadth of their endeavors. Even with PCI, HIPAA and other compliance requirements, it is essential that security be proactive because being compliant does not mean that your institution is secure.

Attack Path Analytics

Security organizations have no problem finding vulnerabilities on enterprise networks – the volume of security data is constantly growing The greater challenge is sifting through this data to determine which situations present the greatest risk to the business and prioritizing remediation efforts Using attack path analytics enables a strategic, risk-based approach to security remediation

Pages