Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Jack Daniel

Jack Daniel's picture
A regular, featured speaker at ShmooCon, SOURCE Boston, DEF CON, RSA and other marque conferences, Jack is widely considered a leading technology community activist. He is co-host of Security Weekly and served as director of the National Information Security Group (NAISG). He is co-founder of Security BSides, and his Uncommon Sense Security blog has been named to the Security Bloggers Network Hall of Fame. Current Position: As Strategist, Jack helps develop Tenable SecurityCenter and provide valuable insight to consumers about current IT trends.
Blog Post
Monday, October 31, 2016

*/ A s National Cybersecurity Awareness Month draws to a close on Halloween, it is a fitting time to reflect on some of the ghosts of infosec. Friendly and unfriendly...

Blog Post
Friday, January 30, 2015

T he healthcare industry is one of the most heavily regulated business types today. To secure electronic protected health information (ePHI), organizations look to the Health Insurance Portability and Accountability...

Blog Post
Monday, September 15, 2014

F inancial services organizations are some of the most highly protected institutions in the nation, but, at the same time, are under constant attack. As a result, financial institutions have...

Blog Post
Friday, March 21, 2014

With the new compliance plugin and audit file for the Brocade Fabric OS (FOS), Tenable customers can now audit their Brocade FOS configurations for industry best practices and a number of different checks.

Blog Post
Tuesday, March 18, 2014

Nessus can now perform configuration auditing against device configuration files, rather than the systems themselves. Users can make proposed changes in the configurations and test the security of the changes before they go into production, making it easier to test and deploy securely configured devices throughout the network

Blog Post
Monday, July 1, 2013

Nessus provides the ability to modify vulnerability findings in scan results. The new settings provide Nessus users with the ability to change the severity of findings, or hide them completely for a single host, a single scan, all future scans, or a specific time period.

Blog Post
Wednesday, May 29, 2013

Tenable has released the Log Correlation Engine, version 4.2. This major release provides several significant new features and enhancements, including: Automatic Asset Discovery Assets are detected and identified through inspection...

Blog Post
Tuesday, December 4, 2012

<div class="lightgray"> <p class="nom"><strong>Note:</strong> Tenable SecurityCenter is now Tenable.sc. To learn more about this application and its latest capabilities, visit the <a href=" https://www.tenable.com/products/tenable-sc">Tenable.sc</a> web page.</p> </div> <p></p> <p>Tenable Network...

Blog Post
Monday, July 9, 2012

Around the time of RSA in February, I wrote about the risk of burnout for security professionals, and offered some warning signs — including feelings of stress, exhaustion, or a lack of self-efficacy — that might indicate you’re on the burnout scale. At this year’s Gartner Security and Risk Management Summit, the Tenable team decided to dig a little deeper and conducted a survey that explores a number of security issues, including some of the causes of burnout. Keep a look out for the official numbers in the coming weeks. In the meanwhile, here are three questions you should ask yourself — based on the early survey findings — to prevent security burnout before you’re on the scale. Are you working too many hours? The study found that working 50 hours a week isn’t just ordinary — it’s the minimum for most security pros. In fact, the vast majority of respondents said they work between 70 and 80 hours every week. There are two schools of thought to consider here. First, security pros see the economic turmoil that surrounds them and are willing to do more to keep their jobs. Or second, security pros have more work (and responsibility) than they can realistically handle. The second option feels more realistic to me, which leads me to my next question…

Blog Post
Tuesday, June 12, 2012

Social media is generally portrayed as a fast way to lose data, leak information, and ultimately end up in trouble. But social media isn’t only another pain point for the security community – it also has a lot of real assets for us, some of which have dramatically changed the way I do my job. It’s a maddeningly multifaceted issue, with many layers on both sides of the coin. I wanted to start this post by talking about the positive contributions social media has given the security industry – the sharing of knowledge, community, etc. – but then last week’s LinkedIn breach pushed social media privacy concerns right back to the forefront. The LinkedIn breach shows how difficult controlling all the necessary considerations can be when you’re forming and enforcing a social media security policy. You can monitor or limit employee use at work, scan regularly for malware, and educate employees on safe social media practices, but something else can go wrong – like the social network itself mishandling your password. You’re basically playing Whack-a-Mole.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.