Welcome to the Tenable Network Security Podcast - Episode 28
- Several new blog posts have been published this week, including:
- New Nessus training now being offered at conferences! - A new course titled "Advanced Vulnerability Scanning Techniques Using Nessus" is now being offered at both Black Hat Las Vegas 2010 and BruCon 2010. It's a two-day course that will put students into a real-world environment where they will have to solve problems and identify vulnerabilities using the advanced features of the Nessus vulnerability scanner.
- You can provide feedback to this podcast and all of our social media outlets by visiting our discussions forum and adding messages to the "Tenable Social Media" thread. I would love to hear your feedback, questions, comments and suggestions! I put up a call for ideas on new Nessus videos, so please give us your feedback!
- We're hiring! - Visit the web site for more information about open positions. There are currently 7 open positions listed!
- You can subscribe to the NEW Tenable Network Security Podcast on iTunes! You can also subscribe to the new podcast RSS feed directly.
- Tenable Tweets - You can find us on Twitter at http://twitter.com/tenablesecurity where we make various announcements, Nessus plugin statistics and more!
Interview with Ron Gula - Vulnerability Scoring
Review the low/medium/high scoring used by Nessus
- How does Nessus determine if a vulnerability is Low, Medium, or High?
- Should you only focus on the "High" rated vulnerabilities?
- How can the ratings be perfect for every company in the world? (For example, what is "High" for some may be "Low" for others)
NIST CVSS scores and how two people can look at the same vulnerability and come up with different results
- What is the magic behind the CVSS scores?
- How do different organizations come up with different CVSS scores if they're based on math? (Ex. OSVDB gives a vulnerability a higher score, but vendors seem to always score their own vulnerabilities much lower)
Applying CVSS scores to systems, applications, and when evaluating a network
- How can security professionals apply the scoring and ratings systems to operational security?