Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

January 17, 2025

Cybersecurity Snapshot: CISA Lists Security Features OT Products Should Have and Publishes AI Collaboration Playbook

Shopping for OT systems? A new CISA guide outlines OT cyber features to look for. Meanwhile, the U.S. government publishes a playbook for collecting AI vulnerability data. Plus, a White House EO highlights AI security goals. And get the latest on IoT security; secure app dev; and tougher HIPAA cyber rules.

September 22, 2009

Logs of Our Fathers

<p>At USENIX in Anaheim, back in 2005, George Dyson treated us to a fantastic keynote speech about the early history of computing. You can catch a videotaped reprise of it <a href="http://www.ted.com/talks/lang/eng/george_dyson_at_the_birth_of_the_computer.html" target="_blank">here, on the TED site...


July 29, 2009

Event Analysis Training – “Could you look at some odd IRC Connections?”

<p>At one of the research sites that we monitor, an analyst noted that a few servers were consistently making a large number of IRC connections. These connections occurred in a periodic manner and appeared to be automated. This blog entry describes the various steps taken in analyzing the connection...


By  Ron Gula
March 16, 2009

Auditing PHP Settings to OWASP Recommendations with Nessus

<p>Tenable recently released an audit policy for Linux servers running PHP which tests for hardening recommendations from the Open Web Application Security Project (<a href="http://www.owasp.org/index.php/Main_Page">OWASP</a>). OWASP maintains a set of guidelines for hardening web servers, with spec...


By  Ron Gula
February 12, 2009

ShmooCon 2009 - Playing Poker for Charity

Tenable sponsored a booth at this year&#39;s ShmooCon and ran a Texas Hold&#39;em table to help raise money for the Hackers for Charity organization. We raised close to $400 from conference attendees and scheduled &quot;guest&quot; players such as Paul Asadoorian from PaulDot.Com, Simple Nomad from ...


By  Ron Gula
January 5, 2009

DOJOSEC - Compliance Presentation

The next DOJOSEC is this week. I've been invited to speak about the latest compliance trends in PCI and FDCC. Also presenting will be Shaf Ramsey of TechGaurd Security and Dale Beauchamp of the Transportation Security Administration. Mr. Ramsey will discuss the future of virtual worlds such as HIPIH...


By  Ron Gula
December 14, 2008

Marcus Ranum PaulDotCom Interview on Penetration Testing

Tenable's CSO, Marcus Ranum, was recently interviewed on the PaulDotCom Security Weekly podcast. They discussed a wide range of topics regarding penetration testing, secure coding, Marcus's "6 Dumbest Ideas" in computer security and much more.Full PaulDotCom show notes.Direct link to the show's MP3 ...


By  Ron Gula
November 4, 2008

PCI Executive Roundtables in New York and Atlanta

Tenable Network Security has partnered with IANS to sponsor two executive level PCI discussions in New York City and Atlanta. Both events are this week, and we have limited seating available for corporations who are facing the challenges of being and demonstrating PCI compliance. Questions to be ans...


By  Ron Gula
April 4, 2008

Nessus turns 10 !

Ten years ago today, I announced the initial public release of Nessus on the bugtraq mailing list. The initial version would run only on Linux and was bundled with 50 plugins (vulnerability checks) written in C. At that time I was 18 and I had no idea I would still work on it years later (or that an...


October 10, 2007

Being the Caveman - Tenable Style

After reading Richard Bejtlich's &quot;Be the Caveman&quot; blog post about the convicted hacker Robert Moore, I felt it would be interesting to show how unifying vulnerability monitoring, configuration auditing, passive network discovery and log analysis helps organizations detect intruders. This b...


By  Ron Gula

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >