Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

January 24, 2025

Cybersecurity Snapshot: WEF Offers AI Security Best Practices, as DORA Regulation Places Strict Cyber Rules on Banks

Check out tips for adopting AI securely from the World Economic Forum. Plus, the EU’s DORA cyber rules for banks go into effect. Meanwhile, a report warns about overprivileged cloud accounts. And get the latest on ransomware trends; CIS Benchmarks; and data privacy.

April 23, 2007

Finding Low Frequency Events

Very often when I speak with Tenable customers about performing IDS or Event analysis, I ask them if they use the Time Distribution tool under the Security Center. This tool is used to identify any combination of low frequency events for any query or time period it works with raw IDS events under th...


By  Ron Gula
February 21, 2007

Dragon Intrusion Defense System support for Nessus and the PVS

Today Tenable announced a partnership with Enterasys Networks that enables customers of both companies to operate Nessus and/or the Passive Vulnerability Scanner (PVS) directly on the Dragon sensor. Customers who have existent or planned Tenable and Enterasys security solutions should consider this ...


By  Ron Gula
September 13, 2006

Creating "Gold Build" Audit Policies

Security Center users and the Direct Feed subscribers have the ability to audit the host-based configuration of their UNIX and Windows servers. Tenable has produced several audit polices based on our own research, public guidance from CERT, NSA, NIST and the Center for Internet Security. For the Win...


By  Ron Gula
July 28, 2006

3D Tool Video

Tenable has made the "3D Tool" for the Security Center available. A web-based video of it can be viewed here. The video shows a three dimensional topology graph of some different networks, as well as port to IP and vulnerability to IP graphs. Videos of all of our products can be view here....


By  Ron Gula
July 24, 2006

Tenable and Reconnex

Tenable's Log Correlation Engine (LCE) can accept events from the Reconnex iGuard. If you are not familiar with products like the iGuard, it is a sophisticated network traffic analyzer that can look for social security numbers, credit card numbers, and important corporate data as it flows across ins...


By  Ron Gula
July 19, 2006

SCADA Network Monitoring

Tenable has produced a set of plugins for our Passive Vulnerability Scanner (PVS) based on the publicly available SCADA IDS signatures from Digital Bond. This allows the PVS to discover which devices speak SCADA protocols in addition to more than 3000 other server and client vulnerabilities. This mo...


By  Ron Gula
July 19, 2006

Detecting Network Change

Tenable has recently added several TASL correlation rules which detect a variety of network changes. These rules automatically detect: Changes to servers such as new software and added patches Changes to users such as adding/removing a user, changing their passwords and disabling their account...


By  Ron Gula
July 19, 2006

CentOS Patch Auditing

Tenable is now tracking patch updates to the CentOS Linux operating system. The Nessus Direct and Registered feeds are now updated with host-based patch audits for CentOS. There are more than 200 audits currently available at the time of this post writing. ...


By  Ron Gula
July 19, 2006

Detecting when Credentials Fail

If you are using Nessus to perform credentialed audits of UNIX or Windows systems, analyzing the results to determine if you had the correct passwords and SSH keys can be difficult. Nessus users can now easily detect if their credentials are not working. Tenable has added Nessus plugin #21745. This ...


By  Ron Gula

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >