Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Podcast Episode 178 - "PVS Free Trial, Control System Traps"

Welcome to the Tenable Network Security Podcast Episode 178


Discussion & Highlighted Plugins

Passive Vulnerability Scanner (PVS) Update

  • At the recent Black Hat USA 2013 conference, we announced that PVS will be released as a standalone product, including a free trial. The interface was showcased at the Tenable booth on the show floor and met with a warm welcome. Users can interact with PVS using an HTML5 interface similar to Nessus. What are some of the most compelling use cases for PVS?

Industrial Control System (ICS) Honeypot

  • One of the most talked about presentations from Black Hat was given by researchers who created a fake ICS system, let attackers from across the globe "hack" it, and locate more than 70 different systems that fell into the trap. I believe this helps to raise awareness about security vulnerabilities in ICS systems and shows that attackers will take the opportunity to strike at these valuable targets. The question becomes: Is locating the attackers' systems against the law? Even better, is this valuable data?

Web Services Everywhere

  • One thing that always amazes me is just how many web services exist at any given time on an organization's network. While you must spend time analyzing the security of the applications you know about, you must also look at the web services that tend to hide on your network. So many devices and applications use web services for management, so the results can be overwhelming. Recently released SecurityCenter dashboards and reports help you get a handle on the different web services in your environment. Our products are able to collect detailed information about web services as they reveal information about themselves when you connect to the service, making it easy to identify, but difficult to keep on a leash. What types of web services are the most concerning in terms of a security threat, and what can you do about them?

New & Notable Plugins


Passive Vulnerability Scanner

SecurityCenter Dashboards and Report Templates

Security News Stories

  1. admin to SYSTEM win7 with remote.exe
  2. Firefox Zero-Day Used in Child Porn Hunt?
  3. Chinese hackers take over fake water utility
  4. FBI allowed informants to break law more than 5,600 times in year
  5. Android Apps Can Access All of Your Google Account
  6. Posh potty owners flushed by dodgy Bluetooth password
  7. iOS Weaknesses Allow Attacks Via Trojan Chargers
  8. Water-Utility Honeynet Illuminates Real-world SCADA Threats
  9. Windows phones open to hackers when connecting to rogue Wi-Fi

Subscribe to the Tenable Blog

Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets