Predicting Attack Paths
This paper outlines how to leverage Tenable Nessus and Passive Vulnerability Scanner (PVS) to identify, in real time, internet-facing services that are exploitable, Internet browsing systems that are exploitable and trusted servers that are being managed by exploitable clients.
- Continuous Monitoring
- Vulnerability Management
- Tenable Nessus
- Tenable Nessus Network Monitor