Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Podcast Episode 185 - "We Don't Have Those On Our Network"

Welcome to the Tenable Network Security Podcast Episode 185

Note: Passive Vulnerability Scanner (PVS) is now Nessus Network Monitor. To learn more about this application and its latest capabilities, visit the Nessus Network Monitor web page.


Discussion & Highlighted Plugins

  • "We Don't Have Those On Our Network" - I hear this quite often from folks, especially when presenting on embedded device security issues. Those running enterprise, or even smaller, networks will state that entire categories of devices, such as Apple TV, are not in use on their network. Recently, I've been highlighting the use of the network search engine Shodan to illustrate the fact that large organizations do in fact have home-based network gear. Furthermore, folks tend to find ways to use technology in the workplace to get things done. For example, someone stated they have an Apple TV in every conference room and use it for presentations. This is a great use case for passive vulnerability scanning, finding the device in use by your organization. I'm not saying you shouldn't let the devices come on the network, but that they should receive some level of security which can only be accomplished if you know what's in use.
  • Mobile Dashboards - Smartphones and tablets are another great example of technology used in the workplace. The undeniable fact that such devices improve productivity has earned them a permanent place in our IT infrastructure. The amazing fact about Nessus and SecurityCenter is that you can collect information about smartphones and tablets natively from your environment to enforce policy. Nessus/SecurityCenter will use the information stored in Active Directory to list the devices in use and associated vulnerabilities. The Passive Vulnerability Scanner (PVS) will collect data from the network and report on which devices and applications are in use, as well as associated vulnerabilities. All of this can be rolled up into dashboards and reports to aid the effort of both creating and enforcing policy.

New & Notable Plugins


Passive Vulnerability Scanner

SecurityCenter Apps



Security News Stories

  1. Tenable Network Security Receives Highest Rating Possible in 2013 Gartner Marketscope Report
  2. Hackers Everywhere: A Conversation With Security Thinker Ron Gula
  3. iPhone Fingerprint Scanner Hacked; Should You Care? | Forbes
  4. Students Find Ways To Hack School-Issued iPads Within A Week | NPR: All Tech Considered
  5. 10 Ways to Keep Your WordPress Site Secure
  6. Researchers Unite To #ScanAllTheThings
  7. 5 Reasons Every Company Should Have A Honeypot
  8. Thirteen-Year-Olds Hack Their Way Into Space
  9. Shutdown could test IT security at federal agencies



Subscribe to the Tenable Blog

Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.