Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Stephanie Dunn

Stephanie Dunn's picture
Stephanie Dunn is an Information Security Content Analyst at Tenable, developing our Dashboards, Reports and Assurance Report Cards (ARC’s). She specializes in Windows and Linux Administration with a focus in virtualization, endpoint protection, disaster recovery and enterprise security management. Prior to joining Tenable, Stephanie served as a Network Administrator and Information Security Officer for a government organization. She hold several certifications, including Certified Information Systems Security Professional (CISSP), GIAC Security Essentials (GSEC), and Microsoft Certified Solutions Expert (MCSE).
SC Dashboard
Thursday, January 19, 2017

Protecting the network against an endless number of new and changing threats requires a comprehensive and continuous approach. Misconfigurations in any one these endpoints can be exploited by attackers, and result in confidential data leakage, malware infections, and compromised systems. This dashboard covers key concepts within the NIST 800-53 guide that focuses on data protection, discovery of systems with sensitive data, and detection of data leakage.

SC Dashboard
Tuesday, January 17, 2017

Network assets are always in a constant state of change, as systems traverse the network, and software is installed or updated. Changes can update critical devices or applications, allow for malicious devices or malware to connect to the network, or leave security gaps in devices that can easily be exploited.This dashboard covers key concepts within the NIST 800-53 guide that supports monitoring hardware and software asset changes, and the status of existing security controls.

SC Dashboard
Thursday, January 12, 2017

In order to establish a baseline assessment of an organization's existing security posture, event logs need to be monitored and collected on a continuous basis. Ineffective policies can allow attackers to infiltrate the network, exfiltrate confidential data, and persist for long periods of time. This dashboard covers key concepts within the NIST 800-53 guide that will assist organizations in monitoring malicious activity, track vulnerabilities, and strengthen existing security policies.

SC Report Template
Tuesday, January 3, 2017

Most organizations have security controls in place that focus on protecting the network perimeter, but do not adequately monitor what’s going on inside the network. Unfortunately, many fail to monitor devices that are being connected to the network, and what services are being used. Attackers will exploit vulnerabilities within devices and services to infiltrate the network. Information presented within this report provides a comprehensive look at devices and services in use, and highlights whether systems or security controls need to be hardened.

SC Dashboard
Monday, December 19, 2016

Assigning responsibility for patching systems can vary depending on the number of locations, industry type, and size of the organization. Without having an effective patch management process in place, organizations can easily lose track of who is responsible for managing and patching systems. This dashboard can assist an organization in tracking patch management responsibilities, and provide a clear understanding on how often systems are being patched.

SC Dashboard
Thursday, December 15, 2016

In order to gain a complete visibility into network activity, organizations must be able to collect and monitor event logs on a continual basis. Ineffective policies can allow attackers to infiltrate the network, exfiltrate confidential data, and persist for long periods of time. This dashboard covers key concepts within the ITSG-33 guide that will assist organizations in monitoring malicious activity, tracking vulnerabilities, and strengthening existing policies.

SC Dashboard
Wednesday, December 14, 2016

As mobile workforce demands continue to increase, organizations must provide a secure way to remotely access, connect, and exchange information without compromising network security. These devices are usually running outdated operating systems, and contain vulnerabilities that can spread malware, leak confidential data, and infect other network assets. This dashboard covers key concepts within the ITSG-33 guide that will assist analysts in managing mobile devices, tracking portable device usage, and monitoring usage of cloud-based services.

SC Dashboard
Friday, December 9, 2016

Monitoring the network for asset changes, software installations, and existing security policies can be an overwhelming task for any organization to manage effectively. Failure to continuously monitor network assets and software changes can add additional vulnerabilities and increase risk for the organization. This dashboard covers key concepts within the ITSG-33 guide that monitor for asset changes, software installations, and the status of existing security controls.

SC Dashboard
Thursday, December 8, 2016

Protecting the network against threats requires a comprehensive and continuous approach. Misconfigurations in any one these endpoints will leave security gaps that place critical systems at risk. This dashboard covers key concepts within the ITSG-33 guide that focuses on data protection, discovery of systems with sensitive data, and detection of data leakage.

SC Report Template
Wednesday, December 7, 2016

Monitoring group membership changes is one of the most important aspects of any risk management program. These changes can be the result of routine internal position changes, temporary role changes,...

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.