Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Podcast Episode 178 - "PVS Free Trial, Control System Traps"

Announcements

Discussion & Highlighted Plugins

Passive Vulnerability Scanner (PVS) Update

  • At the recent Black Hat USA 2013 conference, we announced that PVS will be released as a standalone product, including a free trial. The interface was showcased at the Tenable booth on the show floor and met with a warm welcome. Users can interact with PVS using an HTML5 interface similar to Nessus. What are some of the most compelling use cases for PVS?

Industrial Control System (ICS) Honeypot

  • One of the most talked about presentations from Black Hat was given by researchers who created a fake ICS system, let attackers from across the globe "hack" it, and locate more than 70 different systems that fell into the trap. I believe this helps to raise awareness about security vulnerabilities in ICS systems and shows that attackers will take the opportunity to strike at these valuable targets. The question becomes: Is locating the attackers' systems against the law? Even better, is this valuable data?

Web Services Everywhere

  • One thing that always amazes me is just how many web services exist at any given time on an organization's network. While you must spend time analyzing the security of the applications you know about, you must also look at the web services that tend to hide on your network. So many devices and applications use web services for management, so the results can be overwhelming. Recently released SecurityCenter dashboards and reports help you get a handle on the different web services in your environment. Our products are able to collect detailed information about web services as they reveal information about themselves when you connect to the service, making it easy to identify, but difficult to keep on a leash. What types of web services are the most concerning in terms of a security threat, and what can you do about them?

New & Notable Plugins

Nessus

Passive Vulnerability Scanner

SecurityCenter Dashboards and Report Templates

Security News Stories

  1. admin to SYSTEM win7 with remote.exe
  2. Firefox Zero-Day Used in Child Porn Hunt?
  3. Chinese hackers take over fake water utility
  4. FBI allowed informants to break law more than 5,600 times in year
  5. Android Apps Can Access All of Your Google Account
  6. Posh potty owners flushed by dodgy Bluetooth password
  7. iOS Weaknesses Allow Attacks Via Trojan Chargers
  8. Water-Utility Honeynet Illuminates Real-world SCADA Threats
  9. Windows phones open to hackers when connecting to rogue Wi-Fi

Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.