Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Megan Daudelin

Megan Daudelin's picture
Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
SC Dashboard
Wednesday, April 13, 2016

On April 12, 2016, Microsoft and the Samba Core Team disclosed details about the Badlock vulnerability. Badlock is a critical security bug affecting Windows and Samba, which exposes systems to man-in-the-middle and denial of service attacks. The Badlock Discovery dashboard can assist organizations with identifying hosts and vulnerabilities related to Microsoft Windows SMB and Samba.

SC Report Template
Monday, April 4, 2016

Securing an environment against botnet activity is essential to network integrity. If a host is being exploited by a botnet, other hosts and data in the same network are especially vulnerable. The Enhanced Botnet Detection report assists security teams with monitoring the network for activity related to botnets.

SC Dashboard
Friday, April 1, 2016

Securing an environment against botnet activity is essential to network integrity. If a host is being exploited by a botnet, other hosts and data in the same network are especially vulnerable. The Enhanced Botnet Detection dashboard assists security teams with monitoring the network for activity related to botnets.

SC Report Template
Friday, March 4, 2016

File integrity monitoring is a key component of any information security program. Changes to files across the network are common, but they can also reduce security posture and in some cases may be indicative of a breach in progress. The File Integrity Monitoring report provides a platform from which to monitor file integrity events on the network.

SC Dashboard
Thursday, March 3, 2016

DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) (CVE-2016-0800) is a vulnerability that affects services that rely on SSL and TLS. Unlike other SSL vulnerabilities, DROWN only requires that SSLv2 be enabled on the attacked system and not that SSLv2 be used for communications. The DROWN Attack Vulnerability dashboard assists security teams with identifying systems on the network that are vulnerable to DROWN attacks.

SC Report Template
Tuesday, March 1, 2016

As organizations continue to evolve, wireless technologies are being integrated into existing networks to support employee mobility needs. Since wireless access can expose devices to unique threats, monitoring devices for access to suspicious or malicious wireless networks is essential. The Wireless Configuration report provides extensive information about the wireless networks accessed by scanned hosts in the organization.

SC Dashboard
Wednesday, February 17, 2016

Risk mitigation is a constantly moving target as new exploits are developed and new vulnerabilities are discovered. Vulnerability remediation efforts can be precisely tailored to address the current threats imposed by specific exploit frameworks. The Exploits by Platform dashboard assists security teams with the process of vulnerability remediation by providing an enhanced view of the security of a network against specific exploit frameworks.

SC Dashboard
Tuesday, February 2, 2016

Monitoring Unix and Linux hosts for vulnerabilities is an essential piece of securing a network. Various distributions can be susceptible to different vulnerabilities, so understanding which Unix or Linux distributions are used in the environment is important. The Unix and Linux Distribution Vulnerabilities dashboard assists security teams with monitoring Unix and Linux hosts within their network.

SC Dashboard
Friday, January 29, 2016

The Domain Name System (DNS) is an integral component in most modern networks. DNS facilitates the identification and access of services and devices across a network. The DNS Summary dashboard monitors events and vulnerabilities related to DNS in the network.

SC Dashboard
Tuesday, January 26, 2016

Monitoring a network for indications of abuse, compromise, and intrusion is a daunting task for any security team to tackle. Close monitoring of system log data can help reduce incident response time, but keeping pace with the rate of syslog generation can prove impossible. The Event Indicator Alert dashboard monitors events that could be indicative of compromise.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.