Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

April 4, 2025

Cybersecurity Snapshot: SANS Recommends Six Controls To Secure AI Systems, While NCSC Warns About Outdated API Security Methods

Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security practices. In addition, CISA and other cyber agencies warn that attackers are using “fast flux” techniques to conceal their actions. And much more!

January 23, 2013

Using Nessus to Audit Microsoft SharePoint 2010 Configurations

Trust, but Verify Recently, Tenable added audit files for Nessus ProfessionalFeed users allowing them to audit Microsoft SharePoint server configurations. The audit policy uses both operating system and database information from a SharePoint server farm and compares it against the settings specifie...


November 8, 2012

Tenable Network Security Podcast Episode 145 - "Source Code Leaks, Problems with Computer Security"

<h3>Announcements</h3> <ul> <li><a href="http://www.tenable.com/careers/">We're hiring</a>! - Visit the Tenable website for more information about open positions.</li> <li>Check out <a href="http://www.youtube.com/tenablesecurity">our video channel on YouTube</a> which contains new Nessus and Sec...


August 9, 2012

Tenable Releases SecurityCenter Continuous View

<p>Today, Tenable <a href="http://www.tenable.com/news-events/press-releases/2012-tenable-network-security-unveils-securitycenter-continuous-view" target="_self" title="Tenable Network Security Unveils SecurityCenter Continuous View">announced </a>the availability of a new edition of SecurityCenter,...


April 9, 2012

Tenable Network Security Podcast Episode 119 - "Macs Don't Get Viruses, Detecting OS X Malware"

<h3>Announcements</h3> <ul> <p><li><a href="http://www.nessus.org/news-events/press-releases/2012-tenable-network-security-certified-as-approved-scanning-vendor-asv-b">Tenable Network Security Certified as Approved Scanning Vendor (ASV) by PCI Security Standards Council</a>.</li></p> <p><li>Check...


May 30, 2011

SecurityCenter 4.2 and Community Dashboard Site Released

<p><a href="http://blog.tenable.com/.a/6a00d8345495f669e201538ed394cc970b-pi" style="display: inline;"><img alt="FWR_SC" border="0" class="asset asset-image at-xid-6a00d8345495f669e201538ed394cc970b" src="http://blog.tenable.com/.a/6a00d8345495f669e201538ed394cc970b-800wi" title="FWR_SC" /></a>&#01...


By  Ron Gula
February 7, 2011

Tenable All-Star Showcase - Atlanta - February 22

&nbsp;Tenable Network Security will be hosting a half-day security and compliance seminar in Atlanta featuring Marcus Ranum, Ron Gula and Renaud Deraison. This is your chance to interact with Tenable executives, get the latest news and perspectives on industry trends, ask questions about Nessus and ...


By  Ron Gula
January 13, 2011

Putting a Virus under the SIEM Microscope Webinar

&nbsp;&nbsp;When a virus infected one of my Nessus scan targets, I did what any sensible CEO&nbsp;of a SIEM company would do - let it run and see what types of logs and alerts it generated!Over the 30 days that I let it run, I was able to collect a wide variety of interesting data. This included sus...


By  Ron Gula
January 5, 2011

Tenable Network Security Podcast - Episode 64

<p>Welcome to the Tenable Network Security Podcast - Episode 64</p> <p>Hosts: Paul Asadoorian, Product Evangelist, and Ron Gula, CEO/CTO</p> <h3>Announcements</h3> <ul> <li>Several new blog posts have been published this week, including: <ul><li><a href="http://blog.tenablesecurity.com/2011/01/...


January 5, 2011

Log Correlation Engine 3.6 – Now with its own GUI

<p>Tenable Network Security has released version 3.6 of the <a href="http://www.nessus.org/products/lce/" target="_self">Log Correlation Engine</a>. This new version includes many performance enhancements as well as its own web-based user interface. This blog entry describes the new user interface, ...


By  Ron Gula

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >