Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Network Security Podcast - Episode 23

Welcome to the Tenable Network Security Podcast - Episode 23

Announcements

Interview: Josh Corman

Ron Gula interviews Josh Corman and discusses information asymmetry, compliance and more. Josh is an analysts with the 451Group and recently published a 451 Spotlight (registration required) which describes the evolution of trust between consumers and vendors the security industry has gone through over the past 15 years.

Josh Corman Web.jpg

Stories

  • Casual Hex and the Failure of Security Awareness Training - We've all heard that end-user security awareness training is an important piece of your security strategy. However, in this article, Larry Pesce throws a dose of reality on this strategy and states that users will ignore the training and become victims of attacks anyway. I do agree that end-user awareness training will do little to stop people from clicking on nasty stuff and is not likely to make them techno-geeks who understand how attacks work. However, this does not mean that it's a lost cause. Effective training will help people identify suspicious emails, know how some of the attacks work, be more resistant to social engineering and teach them what to do once they have become compromised. There is value in this training, and when coupled with some of the other defensive techniques, such as limiting access to Internet services, it can increase the security of your organization. For example, by teaching people about the nasty stuff out there on the Internet, they may be more inclined to accept a more stringent Internet usage policy. Furthermore, by giving up on end-user awareness training you are leaving the user to swim with the sharks when they take the corporate laptop to a coffee shop or browse the web at home.
  • Reverse Engineering File Formats - A really neat article from Jeremy Brown on how to reverse engineer a file format. You may think that "reverse engineering" always requires a debugger and staring at hex code for days on end. Jeremy shows us an example of using an application's error messages to figure out the structure of the file format.
  • TSA Gets Some Intelligence - Hopefully this comes with training too! I believe that providing intelligence to the TSA is a good thing, but I hope that the government also provides them with training on how to use it to profile passengers. The same is true in your organization's security strategy; it's great to have all of the information about your systems and network, but it's also important to know what to do with it. For example, if you are collecting information from all of your systems' logs but not acting upon it or analyzing it for trends, then you are not recognizing the value of the information.
  • Postgres Database Default Password - Another reason why I love OSVDB
  • - Default passwords are a security hole that can be avoided. We need to educate developers and companies that make software to not build this into their products. Allow users to choose their own passwords! Also, Nessus Plugin 10483 will detect this default password in Postgres.

Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.