Auditing More Network Devices Offline with Nessus
February 4, 2015Let’s do a show of hands. How many network administrators go through a security audit without experiencing some anxiety? Anyone? I am guessing not many. And I can understand why. The problem In mo...
Implement Good Cyber Hygiene with Continuous Network Monitoring
January 22, 2015<p>Good cyber hygiene means appropriately protecting and maintaining IT systems and devices and implementing cybersecurity best practices. When good cyber hygiene is built upon a continuous network monitoring platform, you continuously visualize the security posture of your entire IT infrastructure and better protect your organization against advanced cyber attacks.</p>
Why Periodic Security Scans Aren’t Good Enough in Today’s Threat Environment
November 13, 2014In a recent post in Wired’s Innovation Insights blog, Ron Gula explains why continuous monitoring is needed as preventive healthcare to protect today’s IT landscape. An annual medical exam is routi...
Breaking Cyber Kill Chains®
October 29, 2014The “cyber kill chain®”1 is a model for framing an incident response/analysis capability that was developed by Lockheed Martin’s Computer Incident Response Team. It is a useful framework for talking a...
Recent Malaysian ATM Attacks Underscore Criticality of Continuous Monitoring
October 6, 2014Recently, an unusual series of attacks occurred against ATM machines in Malaysia. What makes this set of attacks unusual is that the attackers combined a physical attack against an older Windows XP ba...
The Weakest Link – Cloud Application Users and Administrators
August 26, 2014Privileged users are a fact of life, but they pose an expanding opportunity to adversaries in the new IT landscape. There are two classes of privileged users on your network today: the users of your c...
Tenable SecurityCenter Continuous View Sheds Light On Shadow IT Usage
August 7, 2014<p>Tenable’s SecurityCenter Continuous View makes it easy for companies to detect the use of cloud services and identify data stored in the cloud</p>
Continuous Monitoring for the New IT Landscape
August 6, 2014The landscape of IT security is changing and the rash of recent data breaches has targeted a fatal flaw in the way organizations have approached security over the last two decades. When it comes to se...
How Gaps in Pen Testing and Intrusion Detection Paved the Path to Continuous Monitoring
August 5, 2014Last week I had my annual physical, with the goal of checking the big things—heart, cholesterol, blood pressure. I also had an ache in my foot that had caused me some trouble running, but which I had ...
Installing and Using Nessus on Kali Linux
July 10, 2014Note: These 2014 instructions are for installing Nessus version 5 on Kali Linux. Please see the newer blog, Getting Started with Nessus on Kali Linux, for information on installing Nessus version 6 an...
Nessus Now Audits Huawei VRP Configurations
July 8, 2014As part of Tenable's Continuous Monitoring Solution, Nessus, Nessus Enterprise and Nessus Enterprise Cloud users can now perform configuration audits against Huawei devices running the Versatile Routi...
Detecting Credit Cards, SSNs and other Sensitive Data on UNIX/Linux Systems
June 16, 2014Nessus, Nessus Enterprise and Nessus Enterprise Cloud users can now remotely scan UNIX and Linux systems for the presence of sensitive information such as credit/debit card numbers, SSNs, company conf...