Tenable blog
Frequently Asked Questions About the MITRE CVE Program Expiration and Renewal

Cyber Exposure: The Next Frontier for Security
The stakes have never been higher when it comes to cybersecurity. Global cyber attacks such as the recent WannaCry ransomware attack is a sobering reminder that cybersecurity is the existential threat of this generation. A new report from Lloyd’s of London estimates a serious cyber attack could cost...
Getting Started with Nessus on Kali Linux
Kali Linux, a Linux distribution designed specifically for penetration testing, comes prepackaged with many pen test tools. Nessus® provides a penetration tester with a wealth of capabilities that will assist in the engagement, such as:Identifying local and remote vulnerabilitiesConfiguration and co...
Outstanding Patch Tracking Dashboard
Editor's note: Our dashboards have been updated in the time since this blog was originally published. Please see this page for the latest guidance on Outstanding Remediation Tracking. The IT Operations teams in most organizations run in monthly cycles from “Patch Tuesday” to “Patch Tuesday.” The ...
Threat Hunting with YARA and Nessus
In Nessus 6.7, file system scanning functionality was introduced that could look for specific file hashes of files on disk. This was in addition to the running process detection which has been supported for quite some time. Now, as part of the Nessus 6.8 release, we’ve introduced YARA to our Windows...
Installing and Using Nessus on Kali Linux
Note: These 2014 instructions are for installing Nessus version 5 on Kali Linux. Please see the newer blog, Getting Started with Nessus on Kali Linux, for information on installing Nessus version 6 and higher on Kali Linux 2016. Note: Nessus Cloud is now a part of Tenable.io Vulnerability...
Tenable Network Security Podcast Episode 198 - "PCI Discussion Featuring Jeffrey Man"
<p></p>...
Tenable Network Security Podcast Episode 177 - "Securing Management Devices, Database Security?"
<p></p>...
The Big Red Button and the Kill Switch
I have no idea if I had a role in the "Internet Kill Switch" debacle, but it's possible that I was one of the pushes that got that particularly horrible ball rolling. Back in 2002, when I was between jobs, I did a talk at CSI in Chicago, about the need for organizations to be better able to react to...